[go: up one dir, main page]

US20250308617A1 - Non-volatile memory with in-place error correction - Google Patents

Non-volatile memory with in-place error correction

Info

Publication number
US20250308617A1
US20250308617A1 US18/624,898 US202418624898A US2025308617A1 US 20250308617 A1 US20250308617 A1 US 20250308617A1 US 202418624898 A US202418624898 A US 202418624898A US 2025308617 A1 US2025308617 A1 US 2025308617A1
Authority
US
United States
Prior art keywords
memory cells
data
threshold voltage
memory
voltage distribution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/624,898
Inventor
Jiahui Yuan
Ming Wang
Liang Li
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SanDisk Technologies LLC
Original Assignee
SanDisk Technologies LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SanDisk Technologies LLC filed Critical SanDisk Technologies LLC
Priority to US18/624,898 priority Critical patent/US20250308617A1/en
Assigned to SANDISK TECHNOLOGIES LLC reassignment SANDISK TECHNOLOGIES LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LI, LIANG, WANG, MING, YUAN, JIAHUI
Assigned to SanDisk Technologies, Inc. reassignment SanDisk Technologies, Inc. ASSIGNMENT OF ASSIGNOR'S INTEREST Assignors: SANDISK TECHNOLOGIES LLC
Assigned to SanDisk Technologies, Inc. reassignment SanDisk Technologies, Inc. PARTIAL RELEASE OF SECURITY INTERESTS Assignors: JPMORGAN CHASE BANK, N.A., AS AGENT
Assigned to JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: SanDisk Technologies, Inc.
Publication of US20250308617A1 publication Critical patent/US20250308617A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C16/00Erasable programmable read-only memories
    • G11C16/02Erasable programmable read-only memories electrically programmable
    • G11C16/06Auxiliary circuits, e.g. for writing into memory
    • G11C16/34Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
    • G11C16/3404Convergence or correction of memory cell threshold voltages; Repair or recovery of overerased or overprogrammed cells
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C11/00Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
    • G11C11/56Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency
    • G11C11/5621Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency using charge storage in a floating gate
    • G11C11/5628Programming or writing circuits; Data input circuits
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C11/00Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
    • G11C11/56Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency
    • G11C11/5621Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency using charge storage in a floating gate
    • G11C11/5642Sensing or reading circuits; Data output circuits
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C16/00Erasable programmable read-only memories
    • G11C16/02Erasable programmable read-only memories electrically programmable
    • G11C16/04Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS
    • G11C16/0483Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS comprising cells having several storage transistors connected in series
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C16/00Erasable programmable read-only memories
    • G11C16/02Erasable programmable read-only memories electrically programmable
    • G11C16/06Auxiliary circuits, e.g. for writing into memory
    • G11C16/26Sensing or reading circuits; Data output circuits
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
    • G11C29/02Detection or location of defective auxiliary circuits, e.g. defective refresh counters
    • G11C29/021Detection or location of defective auxiliary circuits, e.g. defective refresh counters in voltage or current generators
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
    • G11C29/52Protection of memory contents; Detection of errors in memory contents

Definitions

  • the present disclosure relates to non-volatile storage.
  • Semiconductor memory is widely used in various electronic devices such as cellular telephones, digital cameras, personal digital assistants, medical electronics, mobile computing devices, servers, solid state drives, non-mobile computing devices and other devices.
  • Semiconductor memory may comprise non-volatile memory or volatile memory.
  • Non-volatile memory allows information to be stored and retained even when the non-volatile memory is not connected to a source of power (e.g., a battery).
  • a source of power e.g., a battery
  • flash memory e.g., NAND-type and NOR-type flash memory
  • Non-volatile memory Users of non-volatile memory can program (e.g., write) data to the non-volatile memory and later read that data back. For example, a digital camera may take a photograph and store the photograph in non-volatile memory. Later, a user of the digital camera may view the photograph by having the digital camera read the photograph from the non-volatile memory. Because users often rely on the data they store, it is important to users of non-volatile memory that the non-volatile memory operate reliably (e.g., user be able to successfully read back data stored in the non-volatile memory).
  • a digital camera may take a photograph and store the photograph in non-volatile memory. Later, a user of the digital camera may view the photograph by having the digital camera read the photograph from the non-volatile memory. Because users often rely on the data they store, it is important to users of non-volatile memory that the non-volatile memory operate reliably (e.g., user be able to successfully read back
  • FIG. 1 is a block diagram depicting one embodiment of a storage system.
  • FIG. 2 A is a block diagram of one embodiment of a memory die.
  • FIG. 2 B is a block diagram of one embodiment of an integrated memory assembly.
  • FIG. 2 C depicts details of an individual sense block.
  • FIGS. 3 A and 3 B depict different embodiments of integrated memory assemblies.
  • FIG. 4 is a perspective view of a portion of one embodiment of a monolithic three dimensional memory structure.
  • FIG. 4 A is a block diagram of one embodiment of a memory structure having two planes.
  • FIG. 4 B depicts a top view of a portion of one embodiment of a block of memory cells.
  • FIG. 4 C depicts a cross sectional view of a portion of one embodiment of a block of memory cells.
  • FIG. 4 D depicts a cross sectional view of a portion of one embodiment of a block of memory cells.
  • FIG. 4 E is a cross sectional view of one embodiment of a vertical column of memory cells.
  • FIG. 4 F is a schematic of a plurality of NAND strings in multiple regions of a same block.
  • FIG. 5 A depicts threshold voltage distributions.
  • FIG. 5 B depicts threshold voltage distributions.
  • FIG. 5 C depicts threshold voltage distributions.
  • FIG. 6 is a flow chart describing one embodiment of a process for programming non-volatile memory.
  • FIG. 7 is a timing diagram describing one embodiment of a read operation.
  • FIG. 8 is a flow chart describing on embodiment of a process for reading.
  • FIG. 9 is a flow chart describing on embodiment of a process for reading.
  • FIGS. 10 A and 10 B depict a set of overlapping threshold voltage distributions for a set of data states.
  • MRAM magnetoresistive random access memory
  • the elements are formed from two ferromagnetic layers, each of which can hold a magnetization, separated by a thin insulating layer.
  • One of the two layers is a permanent magnet set to a particular polarity; the other layer's magnetization can be changed to match that of an external field to store memory.
  • a memory device is built from a grid of such memory cells. In one embodiment for programming, each memory cell lies between a pair of write lines arranged at right angles to each other, parallel to the cell, one above and one below the cell. When current is passed through them, an induced magnetic field is created.
  • MRAM based memory embodiments will be discussed in more detail below.
  • System control logic 260 , row control circuitry 220 , and column control circuitry 210 may be formed by a common process (e.g., CMOS process), so that adding elements and functionalities, such as ECC, more typically found on a memory controller 120 may require few or no additional process steps (i.e., the same process steps used to fabricate controller 120 may also be used to fabricate system control logic 260 , row control circuitry 220 , and column control circuitry 210 ).
  • CMOS process e.g., CMOS process
  • row control circuitry 220 including row decoder 222 , array drivers 224 , and block select 226 are coupled to memory structure 202 through electrical paths 208 .
  • Each of electrical path 208 may correspond to a word line, dummy word line, or select gate line. Additional electrical paths may also be provided between control die 211 and memory die 201 .
  • FIG. 2 C is a block diagram depicting an individual sense block 302 of sense amplifiers 230 partitioned into a core portion 304 (referred to as a sense module 304 ) and a common portion 306 .
  • a sense module 304 there will be a separate sense module 304 for each bit line and one common portion 306 for a set of multiple sense modules 304 .
  • a sense block 302 will include one common portion 306 connected to eight, twelve, or sixteen sense modules 304 . Each of the sense modules 304 in a group will communicate with the associated common portion 306 via a data bus 308 .
  • sense amplifiers 230 will include many sense blocks 302 .
  • Sense module 304 comprises sense circuitry 310 that determines whether a conduction current in a connected bit line is above or below a predetermined level or, in voltage based sensing, whether a voltage level in a connected bit line is above or below a predetermined level.
  • the sense circuitry 310 is to receive control signals from the state machine via input lines 312 .
  • sense circuitry 310 includes a circuit commonly referred to as a sense amplifier.
  • Sense module 304 also includes a bit line latch 314 that is used to set a voltage condition on the connected bit line. For example, a predetermined state latched in bit line latch 314 will result in the connected bit line being pulled to a state designating program inhibit (e.g., VDD).
  • a state designating program inhibit e.g., VDD
  • the operation of the system is under the control of state machine 262 that controls (using power control 264 ) the supply of different control gate or other bias voltages to the addressed memory cell(s).
  • state machine 262 controls (using power control 264 ) the supply of different control gate or other bias voltages to the addressed memory cell(s).
  • the sense module 304 may trip at one of these voltages and an output will be provided from sense module 304 to processor 320 via bus 308 .
  • processor 320 determines the resultant memory state by consideration of the tripping event(s) of the sense module 304 and the information about the applied control gate voltage from the state machine via signal lines 490 . It then computes a binary encoding for the memory state and stores the resultant data bits into data latches 322 .
  • bit line latch 314 serves double duty, both as a latch for latching the output of the sense module 304 and also as a bit line latch as described above.
  • Data latch stack 322 contains a stack of data latches corresponding to an associated sense module 304 . In one embodiment, there are three, four or another number of data latches per sense module 304 . In one embodiment, the latches are each one bit (e.g., one bit per sense module 304 ). In one embodiment, the latches for each sense module 304 will be referred to as SDL, XDL, ADL, BDL, and CDL. Thus, in one embodiment, each sense module 304 has its own set of SDL, XDL, ADL, BDL, and CDL. In the embodiments discussed here, the latch XDL is a transfer latch used to exchange data with the I/O interface 324 .
  • the additional latches ADL, BDL and CDL can be used to hold multi-state data, where the number of such latches typically reflects the number of bits stored in a memory cell.
  • the three sets of latches ADL, BDL, CDL can be used for upper, middle, lower page data.
  • MLC multi-level cell
  • the XDL latches can be used to hold additional pages of data, such as a 4-bit per cell MLC embodiment that uses the XDL latches in addition to the three sets of latches ADL, BDL, CDL for four pages of data.
  • a 4-bit per cell MLC embodiment that uses the XDL latches in addition to the three sets of latches ADL, BDL, CDL for four pages of data.
  • the following discussion will mainly focus on a 3-bit per cell embodiment, as this can illustrate the main features but not get overly complicated, but the discussion can also be applied to embodiments with more or fewer bit per memory cell formats.
  • the latches ADL, BDL, CDL, SDL and XDL can transfer data between themselves and the bit line latch 324 .
  • the system continues (if necessary) to program the memory cell through ADL, while simultaneously loading the data to be programmed into a memory cell on the next word line into XDL, which has been reset.
  • the system can save time and thus perform a sequence of such operations faster.
  • the data to be programmed is stored in the set of data latches 322 from the data bus 326 .
  • Processor 320 monitors the verified memory state relative to the desired memory state. When the two are in agreement, processor 320 sets the bit line latch 314 so as to cause the bit line to be pulled to a state designating program inhibit. This inhibits the memory cell coupled to the bit line from further programming even if it is subjected to programming pulses on its control gate. In other embodiments the processor initially loads the bit line latch 468 and the sense circuitry sets it to an inhibit value during the verify process.
  • the integrated memory assembly 207 includes a stack of multiple control die 211 and multiple memory die 201 .
  • FIG. 3 A depicts a side view of an embodiment of an integrated memory assembly 207 stacked on a substrate 271 (e.g., a stack comprising control dies 211 and memory dies 201 ).
  • the integrated memory assembly 207 has three control dies 211 and three memory dies 201 . In some embodiments, there are more than three memory dies 201 and more than three control die 211 .
  • Each control die 211 is affixed (e.g., bonded) to at least one of the memory dies 201 . Some of the bond pads 282 / 284 are depicted. There may be many more bond pads.
  • a space between two dies 201 , 211 that are bonded together is filled with a solid layer 280 , which may be formed from epoxy or other resin or polymer. This solid layer 280 protects the electrical connections between the dies 201 , 211 , and further secures the dies together.
  • solid layer 280 may be formed from epoxy or other resin or polymer.
  • This solid layer 280 protects the electrical connections between the dies 201 , 211 , and further secures the dies together.
  • Various materials may be used as solid layer 280 , but in embodiments, it may be Hysol epoxy resin from Henkel Corp., having offices in California, USA.
  • the integrated memory assembly 207 may for example be stacked with a stepped offset, leaving the bond pads at each level uncovered and accessible from above.
  • Wire bonds 270 connected to the bond pads connect the control die 211 to the substrate 271 .
  • a number of such wire bonds may be formed across the width of each control die 211 (i.e., into the page of FIG. 3 A ).
  • a memory die through silicon via (TSV) 276 may be used to route signals through a memory die 201 .
  • a control die through silicon via (TSV) 278 may be used to route signals through a control die 211 .
  • the TSVs 276 , 278 may be formed before, during or after formation of the integrated circuits in the semiconductor dies 201 , 211 .
  • the TSVs may be formed by etching holes through the wafers. The holes may then be lined with a barrier against metal diffusion.
  • the barrier layer may in turn be lined with a seed layer, and the seed layer may be plated with an electrical conductor such as copper, although other suitable materials such as aluminum, tin, nickel, gold, doped polysilicon, and alloys or combinations thereof may be used.
  • Solder balls 272 may optionally be affixed to contact pads 274 on a lower surface of substrate 271 .
  • the solder balls 272 may be used to couple the integrated memory assembly 207 electrically and mechanically to a host device such as a printed circuit board.
  • Solder balls 272 may be omitted where the integrated memory assembly 207 is to be used as an LGA package.
  • the solder balls 272 may form a part of the interface between integrated memory assembly 207 and memory controller 120 .
  • FIG. 3 B depicts a side view of another embodiment of an integrated memory assembly 207 stacked on a substrate 271 .
  • the integrated memory assembly 207 of FIG. 3 B has three control die 211 and three memory die 201 .
  • each control die 211 is bonded to at least one memory die 201 .
  • a control die 211 may be bonded to two or more memory die 201 .
  • a space between two dies 201 , 211 that are bonded together is filled with a solid layer 280 , which may be formed from epoxy or other resin or polymer.
  • a solid layer 280 which may be formed from epoxy or other resin or polymer.
  • the integrated memory assembly 207 in FIG. 3 B does not have a stepped offset.
  • a memory die through silicon via (TSV) 276 may be used to route signals through a memory die 201 .
  • a control die through silicon via (TSV) 278 may be used to route signals through a control die 211 .
  • Solder balls 272 may optionally be affixed to contact pads 274 on a lower surface of substrate 271 .
  • the solder balls 272 may be used to couple the integrated memory assembly 207 electrically and mechanically to a host device such as a printed circuit board.
  • Solder balls 272 may be omitted where the integrated memory assembly 207 is to be used as an LGA package.
  • the control die 211 and the memory die 201 may be bonded together.
  • Bond pads on each die 201 , 211 may be used to bond the two dies together.
  • the bond pads are bonded directly to each other, without solder or other added material, in a so-called Cu-to-Cu bonding process.
  • the bond pads are controlled to be highly planar and formed in a highly controlled environment largely devoid of ambient particulates that might otherwise settle on a bond pad and prevent a close bond. Under such properly controlled conditions, the bond pads are aligned and pressed against each other to form a mutual bond based on surface tension. Such bonds may be formed at room temperature, though heat may also be applied.
  • the bond pads may be about 5 ⁇ m square and spaced from each other with a pitch of 5 ⁇ m to 5 ⁇ m. While this process is referred to herein as Cu-to-Cu bonding, this term may also apply even where the bond pads are formed of materials other than Cu.
  • FIGS. 4 B- 4 G depict an example three dimensional (“3D”) NAND structure that corresponds to the structure of FIG. 4 and can be used to implement memory structure 202 of FIGS. 2 A and 2 B .
  • FIG. 4 B is a block diagram depicting a top view of a portion 406 of Block 2 of plane 402 . As can be seen from FIG. 4 B , the block depicted in FIG. 4 B extends in the direction of 432 . In one embodiment, the memory array has many layers; however, FIG. 4 B only shows the top layer.
  • FIG. 4 B depicts a plurality of circles that represent the memory holes, which are also referred to as vertical columns.
  • Each of the memory holes/vertical columns include multiple select transistors (also referred to as a select gate or selection gate) and multiple memory cells.
  • each memory hole/vertical column implements a NAND string.
  • FIG. 4 B labels a subset of the memory holes/vertical columns/NAND strings 432 , 436 , 446 . 456 , 462 , 466 , 472 , 474 and 476 .
  • the block depicted in FIG. 4 B includes a set of isolation regions 482 , 484 , 486 and 488 , which are formed of SiO 2 ; however, other dielectric materials can also be used. Isolation regions 482 , 484 , 486 and 488 serve to divide the top layers of the block into five regions; for example, the top layer depicted in FIG. 4 B is divided into regions 430 , 440 , 450 , 460 and 470 . In one embodiment, the isolation regions only divide the layers used to implement select gates so that NAND strings in different regions can be independently selected.
  • a bit line connects to one memory hole/vertical column/NAND string in each of regions 430 , 440 , 450 , 460 and 470 .
  • each block has twenty four rows of active columns and each bit line connects to five rows in each block.
  • all of the five memory holes/vertical columns/NAND strings connected to a common bit line are connected to the same set of word lines; therefore, the system uses the drain side select lines to choose one (or another subset) of the five to be subjected to a memory operation (program, verify, read, and/or erase).
  • FIG. 4 B also shows Line Interconnects LI, which are metal connections to the source line SL from above the memory array.
  • Line Interconnects LI are positioned adjacent regions 430 and 470 .
  • FIG. 4 B shows each region 430 , 440 , 450 , 460 and 470 having four rows of memory holes/vertical columns, five regions and twenty four rows of memory holes/vertical columns in a block, those exact numbers are an example implementation. Other embodiments may include more or less regions per block, more or less rows of memory holes/vertical columns per region and more or less rows of vertical columns per block.
  • FIG. 4 B also shows the memory holes/vertical columns being staggered. In other embodiments, different patterns of staggering can be used. In some embodiments, the memory holes/vertical columns are not staggered.
  • FIG. 4 C depicts a portion of one embodiment of a three dimensional memory structure 202 showing a cross-sectional view along line AA of FIG. 4 B .
  • This cross sectional view cuts through memory holes/vertical columns (NAND strings) 472 and 474 of region 470 (see FIG. 4 B ).
  • the structure of FIG. 4 C depicts a portion of one embodiment of a three dimensional memory structure 202 showing a cross-sectional view along line AA of FIG. 4 B .
  • This cross sectional view cuts through memory holes/vertical columns (NAND strings) 472 and 474 of region 470 (see FIG. 4 B ).
  • FIG. 4 C depicts a portion of one embodiment of a three dimensional memory structure 202 showing a cross-sectional view along line AA of FIG. 4 B .
  • This cross sectional view cuts through memory holes/vertical columns (NAND strings) 472 and 474 of region 470 (see FIG. 4 B ).
  • FIG. 4 C depicts a portion of one
  • 4 C includes two drain side select layers SGD 0 and SGD; teo source side select layers SGS 0 and SGS 1 ; two drain side GIDL generation transistor layers SGDT 0 and SGDT 1 ; two source side GIDL generation transistor layers SGSB 0 and SGSB 1 ; two drain side dummy word line layers DD 0 and DD 1 ; two source side dummy word line layers DS 0 and DS 1 ; dummy word line layers DU and DL; one hundred and sixty two word line layers WL 0 -WL 161 for connecting to data memory cells, and dielectric layers DL.
  • Other embodiments can implement more or less than the numbers described above for FIG. 4 C .
  • SGD 0 and SGD 1 are connected together; and SGS 0 and SGS 1 are connected together. In other embodiments, more or less number of SGDs (greater or lesser than two) are connected together, and more or less number of SGSs (greater or lesser than two) connected together.
  • erasing the memory cells is performed using gate induced drain leakage (GIDL), which includes generating charge carriers at the GIDL generation transistors such that the carriers get injected into the charge trapping layers of the NAND strings to change threshold voltage of the memory cells.
  • FIG. 4 C shows two GIDL generation transistors at each end of the NAND string; however, in other embodiments there are more or less than three.
  • Embodiments that use GIDL at both sides of the NAND string may have GIDL generation transistors at both sides.
  • Embodiments that use GIDL at only the drain side of the NAND string may have GIDL generation transistors only at the drain side.
  • Embodiments that use GIDL at only the source side of the NAND string may have GIDL generation transistors only at the source side.
  • FIG. 4 C shows that the memory array is implemented as a two tier architecture, with the tiers separated by a Joint area.
  • one embodiment includes laying down a first stack of word line layers (e.g., WL 0 -WL 80 ) alternating with dielectric layers, laying down the Joint area, and laying down a second stack of word line layers (e.g., WL 81 -WL 161 ) alternating with dielectric layers.
  • the Joint area are positioned between the first stack and the second stack.
  • the Joint areas are made from the same materials as the word line layers. In other embodiments, there can no Joint area or there can be multiple Joint areas.
  • a portion (e.g., half the diameter) of vertical column 434 has been removed in layers SGDT 0 , SGDT 1 , SGD 0 , and SGD 1 to accommodate isolation region 482 .
  • the portion of vertical column 434 in layers SGDT 0 , SGDT 1 , SGD 0 , and SGD 1 has a semi-circular cross section.
  • the stack is etched to create space for the isolation region and that space is then filled in with SiO 2 . This structure allows for separate control of SGDT 0 , SGDT 1 , SGD 0 , and SGD 1 for regions 430 , 440 , 450 , 460 , and 470 .
  • FIG. 4 E depicts a cross sectional view of region 429 of FIG. 4 C that includes a portion of memory hole/vertical column 472 .
  • the memory holes/vertical columns are round; however, in other embodiments other shapes can be used.
  • memory hole/vertical column 472 includes an inner core layer 490 that is made of a dielectric, such as SiO 2 . Other materials can also be used.
  • Surrounding inner core 490 is polysilicon channel 491 . Materials other than polysilicon can also be used. Note that it is the channel 491 that connects to the bit line and the source line.
  • Surrounding channel 491 is a tunneling dielectric 492 .
  • tunneling dielectric 492 has an ONO structure.
  • Surrounding tunneling dielectric 492 is charge trapping layer 493 , such as (for example) Silicon Nitride. Other memory materials and structures can also be used. The technology described herein is not limited to any particular material or structure.
  • FIGS. 4 - 4 F are three dimensional memory structure that includes vertical NAND strings with charge-trapping material, other (2D and 3D) memory structures can also be used with the technology described herein.
  • Threshold voltage distribution E corresponds to an erased data state.
  • Threshold voltage distribution P corresponds to a programmed data state. Memory cells that have threshold voltages in threshold voltage distribution E are, therefore, in the erased data state (e.g., they are erased). Memory cells that have threshold voltages in threshold voltage distribution P are, therefore, in the programmed data state (e.g., they are programmed). In one embodiment, erased memory cells store data “1” and programmed memory cells store data “0.”
  • FIG. 5 A depicts read reference voltage Vr. By testing (e.g., performing one or more sense operations) whether the threshold voltage of a given memory cell is above or below Vr, the system can determine a memory cells is erased (state E) or programmed (state P). FIG. 5 A also depicts verify reference voltage Vv. In some embodiments, when programming memory cells to data state P, the system will test whether those memory cells have a threshold voltage greater than or equal to Vv.
  • FIGS. 5 B-D illustrate example threshold voltage distributions for the memory array when each memory cell stores multiple bit per memory cell data.
  • Memory cells that store multiple bit per memory cell data are referred to as multi-level cells (“MLC”).
  • MLC data The data stored in MLC memory cells is referred to as MLC data; therefore, MLC data comprises multiple bits per memory cell.
  • Data stored as multiple bits of data per memory cell is MLC data.
  • each memory cell stores two bits of data.
  • Other embodiments may use other data capacities per memory cell (e.g., such as three, four, or five bits of data per memory cell).
  • FIG. 5 B shows a first threshold voltage distribution E for erased memory cells. Three threshold voltage distributions A, B and C for programmed memory cells are also depicted. In one embodiment, the threshold voltages in the distribution E are negative and the threshold voltages in distributions A, B and C are positive. Each distinct threshold voltage distribution of FIG. 5 B corresponds to predetermined values for the set of data bits. In one embodiment, each bit of data of the two bits of data stored in a memory cell are in different logical pages, referred to as a lower page (LP) and an upper page (UP). In other embodiments, all bits of data stored in a memory cell are in a common logical page. The specific relationship between the data programmed into the memory cell and the threshold voltage levels of the cell depends upon the data encoding scheme adopted for the cells. Table 1 provides an example encoding scheme.
  • memory cells can be programmed from the erased data state E directly to any of the programmed data states A, B or C using the process of FIG. 6 (discussed below).
  • a population of memory cells to be programmed may first be erased so that all memory cells in the population are in erased data state E.
  • a programming process is used to program memory cells directly into data states A, B, and/or C.
  • data states A-C can overlap, with memory controller 120 (or control die 211 ) relying on error correction to identify the correct data being stored.
  • FIG. 5 C depicts example threshold voltage distributions for memory cells where each memory cell stores three bits of data per memory cells (which is another example of MLC data).
  • FIG. 5 C shows eight threshold voltage distributions, corresponding to eight data states.
  • the first threshold voltage distribution (data state) Er represents memory cells that are erased.
  • the other seven threshold voltage distributions (data states) A-G represent memory cells that are programmed and, therefore, are also called programmed states.
  • Each threshold voltage distribution (data state) corresponds to predetermined values for the set of data bits. The specific relationship between the data programmed into the memory cell and the threshold voltage levels of the cell depends upon the data encoding scheme adopted for the cells.
  • FIG. 5 C shows seven read reference voltages, VrA, VrB, VIC, VrD, VrE, VrF, and VrG eat.veggiesfor reading data from memory cells.
  • VrA, VrB, VIC, VrD, VrE, VrF, and VrG eat.veggiesfor reading data from memory cells.
  • the system can determine what data state (i.e., A, B, C, D, . . . ) a memory cell is in.
  • FIG. 5 C also shows seven verify reference voltages, VvA, VvB, VvC, VvD, VVE, VvF, and VvG.
  • VvA threshold voltage greater than or equal to VvA
  • VvB threshold voltage greater than or equal to VvB
  • VvC threshold voltage greater than or equal to VvD
  • VVE VvF
  • VvG seven verify reference voltages
  • FIG. 5 C also shows Vev, which is an erase verify reference voltage to test whether a memory cell has been properly erased.
  • memory cells can be programmed from the erased data state Er directly to any of the programmed data states A-G using the process of FIG. 6 (discussed below).
  • a population of memory cells to be programmed may first be erased so that all memory cells in the population are in erased data state Er.
  • a programming process is used to program memory cells directly into data states A, B, C, D, E, F, and/or G.
  • data state Er may be programmed from data state Er to data state A
  • other memory cells are being programmed from data state Er to data state B and/or from data state Er to data state C, and so on.
  • the arrows of FIG. 5 C represent the full sequence programming.
  • data states A-G can overlap, with control die 211 and/or memory controller 120 relying on error correction to identify the correct data being stored. Note that in some embodiments, rather than using full sequence programming, the system can use multi-pass programming processes known in the art.
  • the selected word line is connected to a voltage (one example of a reference signal), a level of which is specified for each read operation (e.g., see read compare voltages/levels VrA, VrB, VrC, VrD, VrE, VrF, and VrG, of FIG. 5 C ) or verify operation (e.g. see verify target voltages/levels VvA, VvB, VvC, VvD, VvE, VvF, and VvG of FIG. 5 C ) in order to determine whether a threshold voltage of the concerned memory cell has reached such level.
  • a voltage one example of a reference signal
  • the conduction current of the memory cell is measured to determine whether the memory cell turned on (conducted current) in response to the voltage applied to the word line. If the conduction current is measured to be greater than a certain value, then it is assumed that the memory cell turned on and the voltage applied to the word line is greater than the threshold voltage of the memory cell. If the conduction current is not measured to be greater than the certain value, then it is assumed that the memory cell did not turn on and the voltage applied to the word line is not greater than the threshold voltage of the memory cell.
  • the unselected memory cells are provided with one or more read pass voltages (also referred to as bypass voltages) at their control gates so that these memory cells will operate as pass gates (e.g., conducting current regardless of whether they are programmed or erased).
  • read pass voltages also referred to as bypass voltages
  • FIG. 5 C shows no overlap between threshold voltage distributions.
  • FIG. 5 D depicts an embodiment where each memory cell stores three bits of data per memory cells and the threshold voltage distributions overlap with one or more neighboring threshold voltage distributions.
  • the threshold voltage distribution for data state B overlaps with the threshold voltage distributions for data states A and C.
  • the overlap may occur due to factors such as memory cells losing charge (and hence dropping in threshold voltage).
  • Program disturb can unintentionally increase the threshold voltage of a memory cell.
  • read disturb can unintentionally increase the threshold voltage of a memory cell.
  • the locations of the threshold voltage distributions may change. Such changes can increase the bit error rate, thereby increasing decoding time or even making decoding impossible. Changing the read reference voltages can help to mitigate such effects.
  • ECC during the read process can fix errors and ambiguities.
  • FIG. 5 E depicts threshold voltage distributions when each memory cell stores four bits of data, which is another example of MLC data.
  • FIG. 5 E depicts that there may be some overlap between the threshold voltage distributions (data states) S 0 -S 15 .
  • the threshold voltage distributions of FIG. 5 D will include read reference voltages and verify reference voltages, as discussed above.
  • FIG. 5 E shows the threshold voltage distributions overlap with one or more neighboring threshold voltage distributions; however, in some embodiments the threshold voltage distributions for a population of memory cells storing four bits of data per memory cell do not overlap and are separated from each other.
  • each threshold voltage distribution of FIG. 5 E corresponds to a data state (S 0 -S 15 ) and predetermined values for the set of data bits.
  • the specific relationship between the data programmed into the memory cell and the threshold voltage levels of the memory cell depends upon the data encoding scheme adopted for the cells.
  • Table 3 provides an example of an encoding scheme for embodiments in which each bit of data of the four bits of data stored in a memory cell are in different logical pages, referred to as a lower page (LP), middle page (MP), an upper page (UP) and top page (TP).
  • FIG. 6 is a flowchart describing one embodiment of a process for programming memory cells.
  • program and programming are synonymous with write and writing.
  • the process of FIG. 6 is performed for memory array 202 using the one or more control circuits (e.g., system control logic 260 , column control circuitry 210 , row control circuitry 220 ) discussed above.
  • the process of FIG. 6 is performed by integrated memory assembly 207 using the one or more control circuits (e.g., system control logic 260 , column control circuitry 210 , row control circuitry 220 ) of control die 211 to program memory cells on memory die 201 .
  • the process includes multiple loops, each of which includes a program phase and a verify phase.
  • the process of FIG. 6 is performed to implement the full sequence programming, as well as other programming schemes including multi-stage programming. When implementing multi-stage programming, the process of FIG. 6 is used to implement any/each stage of the multi-stage programming process.
  • the program voltage applied to the control gates (via a selected data word line) during a program operation is applied as a series of program voltage pulses. Between program voltage pulses are a set of verify pulses (e.g., voltage pulses) to perform verification. In many implementations, the magnitude of the program voltage pulses is increased with each successive pulse by a predetermined step size.
  • the programming voltage signal (Vpgm) is initialized to the starting magnitude (e.g., ⁇ 12-16V or another suitable level) and a program counter PC maintained by state machine 262 is initialized at 1.
  • the group of memory cells selected to be programmed are programmed concurrently and are all connected to the same word line (the selected word line). There will likely be other memory cells that are not selected for programming (unselected memory cells) that are also connected to the selected word line. That is, the selected word line will also be connected to memory cells that are supposed to be inhibited from programming. Additionally, as memory cells reach their intended target data state, they will be inhibited from further programming. Those NAND strings (e.g., unselected NAND strings) that include memory cells connected to the selected word line that are to be inhibited from programming have their channels boosted to inhibit programming.
  • step 610 program-verify is performed, which includes testing whether memory cells being programmed have successfully reached their target data state. Memory cells that have reached their target states are locked out from further programming by the control die. Step 610 includes performing verification of programming by sensing at one or more verify reference levels. In one embodiment, the verification process is performed by testing whether the threshold voltages of the memory cells selected for programming have reached the appropriate verify reference voltage. In step 610 , a memory cell may be locked out after the memory cell has been verified (by a test of the Vt) that the memory cell has reached its target state.
  • a smart verify technique is used such that the system only verifies a subset of data states during a program loop (steps 604 - 628 ).
  • the first program loop includes verifying for data state A (see FIG. 5 C ), depending on the result of the verify operation the second program loop may perform verify for data states A and B, depending on the result of the verify operation the third program loop may perform verify for data states B and C, and so on.
  • step 616 the number of memory cells that have not yet reached their respective target threshold voltage distribution are counted. That is, the number of memory cells that have, so far, failed to reach their target state are counted.
  • This counting can be done by state machine 262 , memory controller 120 , or another circuit. In one embodiment, there is one total count, which reflects the total number of memory cells currently being programmed that have failed the last verify step. In another embodiment, separate counts are kept for each data state.
  • step 617 the system determines whether the verify operation in the latest performance of step 610 included verifying for the last data state (e.g., data state G of FIG. 5 C ). If so, then in step 618 , it is determined whether the count from step 616 is less than or equal to a predetermined limit.
  • the predetermined limit is the number of bits that can be corrected by error correction codes (ECC) during a read process for the page of memory cells. If the number of failed cells is less than or equal to the predetermined limit, then the programming process can stop and a status of “PASS” is reported in step 614 . In this situation, enough memory cells programmed correctly such that the few remaining memory cells that have not been completely programmed can be corrected using ECC during the read process.
  • ECC error correction codes
  • the predetermined limit used in step 618 is below the number of bits that can be corrected by error correction codes (ECC) during a read process to allow for future/additional errors.
  • ECC error correction codes
  • the predetermined limit can be a portion (pro-rata or not pro-rata) of the number of bits that can be corrected by ECC during a read process for the page of memory cells.
  • the limit is not predetermined. Instead, it changes based on the number of errors already counted for the page, the number of program-erase cycles performed or other criteria.
  • step 617 If in step 617 it was determined that the verify operation in the latest performance of step 610 did not include verifying for the last data state or in step 618 it was determined that the number of failed memory cells is not less than the predetermined limit, then in step 619 the data states that will be verified in the next performance of step 610 (in the next program loop) is adjusted as per the smart verify scheme discussed above.
  • step 620 the program counter PC is checked against the program limit value (PL). Examples of program limit values include 6, 12, 16, 19, 20 and 30; however, other values can be used. If the program counter PC is not less than the program limit value PL, then the program process is considered to have failed and a status of FAIL is reported in step 624 .
  • PL program limit value
  • step 626 the process continues at step 626 during which time the Program Counter PC is incremented by 1 and the programming voltage signal Vpgm is stepped up to the next magnitude.
  • the next pulse will have a magnitude greater than the previous pulse by a step size ⁇ Vpgm (e.g., a step size of 0.1-1.0 volts).
  • step 604 the process continues at step 604 and another program pulse is applied to the selected word line (by the control die) so that another program loop (steps 604 - 626 ) of the programming process of FIG. 6 is performed.
  • control circuit is configured to program memory cells in the direction from the erased data state toward the highest data state (e.g., from data state Er to data state G) and erase memory cells in the direction from the highest data state toward the erased data state (e.g., from data state G to data state Er).
  • One technique to erase memory cells in some memory devices is to bias a p-well (or other types of) substrate to a high voltage to charge up a NAND channel.
  • An erase enable voltage e.g., a low voltage
  • p-well erase this is referred to as p-well erase.
  • GIDL erase gate induced drain leakage
  • the GIDL current is generated by causing a drain-to-gate voltage at a GIDL generation transistor (e.g., transistors connected to SGDT 0 , SGDT 1 , SGSB 0 , and SGSB 1 ).
  • a select gate e.g., SGD or SGS
  • a transistor drain-to-gate voltage that generates a GIDL current is referred to herein as a GIDL voltage.
  • the GIDL current may result when the GIDL generation transistor drain voltage is significantly higher than the GIDL generation transistor control gate voltage.
  • GIDL current is a result of carrier generation, i.e., electron-hole pair generation due to band-to-band tunneling and/or trap-assisted generation.
  • GIDL current may result in one type of carriers (also referred to a charge carriers), e.g., holes, predominantly moving into the NAND channel, thereby raising or changing the potential of the channel.
  • the other type of carriers, e.g., electrons are extracted from the channel, in the direction of a bit line or in the direction of a source line by an electric field.
  • the holes may tunnel from the channel to a charge storage region of the memory cells (e.g., to charge trapping layer 493 ) and recombine with electrons there, to lower the threshold voltage of the memory cells.
  • the GIDL current may be generated at either end (or both ends) of the NAND string.
  • a first GIDL voltage may be created between two terminals of a GIDL generation transistor (e.g., connected to SGDT 0 , SGDT 1 ) that is connected to or near a bit line to generate a first GIDL current.
  • a second GIDL voltage may be created between two terminals of a GIDL generation transistor (e.g., SGSB 0 , SGSB 1 ) that is connected to or near a source line to generate a second GIDL current.
  • Erasing based on GIDL current at only one end of the NAND string is referred to as a one-sided GIDL erase.
  • Erasing based on GIDL current at both ends of the NAND string is referred to as a two-sided GIDL erase.
  • the technology described herein can be used with one-sided GIDL erase and two-sided GIDL erase.
  • FIG. 7 is a timing diagram depicting the behavior of various signals when sensing data during a read operation or a program verify operation.
  • FIG. 7 depicts the following signals: BL(sel), BL(unsel), SGD(sel), SGD(unsel), WLunsel, WLx, DU/DL, SGS and SL.
  • the signal BL(sel) is the voltage applied to bit lines connected to NAND strings having memory cells selected for reading.
  • the signal BL(unsel) is the voltage applied to bit lines connected to NAND strings that do not have any memory cells selected for reading.
  • the signal SGD(sel) is the voltage applied to the drain side select (SGD) lines (e.g., SGD 0 and SGD 1 connected together for one region) for the region (e.g., regions 430 , 440 , 450 , 460 and 470 ) selected for programming.
  • the signal SGD(unsel) is the voltage applied to the drain side select (SGD) lines (e.g., SGD 0 and SGD 1 connected together for one region) for the regions (e.g., regions 430 , 440 , 450 , 460 and 470 ) not selected for programming.
  • the signal WLx is the voltage applied to the word line selected for reading/verifying.
  • the signal WLunsel is the voltage applied to the word lines not selected for reading.
  • DU/DL is the signal applied to the dummy word lines DU and DL, which are adjacent to the Joint area.
  • SGS is the source side select lines (e.g., SGS 0 and SGS 1 connected together for one region).
  • SL is the source line.
  • Vss ground or 0 volts
  • SGD(sel), WLunsel, WLx and DU/DL are raised to Vdd (e.g., ⁇ 3 volts) as part of a step process of ramping up to target voltages.
  • BL(sel) is raised to Vb 1 (e.g., 0.5-1.5v).
  • DU/DL, WLx and WLunsel are raised from Vdd to Vread (e.g., 6-8 volts).
  • Vread is an example of an overdrive voltage because it is high enough to turn on the memory cell regardless of which data state the memory cell has been programmed to.
  • Vpass (used during programming) is another example of an overdrive voltage. Other overdrive voltages can also be used.
  • SGD(sel) is raised from Vdd to Vsg (e.g., 3.5-6v), an example of a sense enabling voltage.
  • WLx is lowered back to ground.
  • WLx is subsequently raised to Vegr (e.g., one of the read reference voltages VrA, VrB, VIC, VrD, VrE, VrF, and VrG of FIG. 5 C ) between t 3 and t 4 .
  • Vegr e.g., one of the read reference voltages VrA, VrB, VIC, VrD, VrE, VrF, and VrG of FIG. 5 C
  • Vegr is one of the verify reference voltages (e.g., VvA, VvB, VvC, VvD, VvE, VvF, and VvG of FIG. 5 C ) applied to WLx.
  • Vv see FIG. 5 C
  • SGS is raised to Vsg, which provides a path for the bit line voltage to dissipate. If Vegr is greater than the threshold voltage of the selected memory cells, then the selected memory cells will conduct current and the bit line voltage will dissipate via the source line, as depicted by curve 794 .
  • Vegr is not greater than the threshold voltage of the selected memory cells, then the selected memory cells will not conduct current and the bit line voltage will not dissipate via the source line, as depicted by curve 792 .
  • the sense amplifiers will sense whether the selected memory cell conducted or not at time t 5 .
  • BL(sel) is lowered to Vss.
  • SGD(sel), WLunsel, WLx, and SGS are lowered to Vss.
  • the system e.g., control circuit
  • ECC codes commonly used in connection with flash memory storage include Reed-Solomon codes, other BCH codes, Hamming codes, and the like.
  • error correction codes used in connection with flash memory storage are “systematic,” in that the data portion of the eventual code word is unchanged from the actual data being encoded, with the code or parity bits appended to the data bits to form the complete code word.
  • the particular read parameters for a given error correction code include the type of code, the size of the block of actual data from which the code word is derived, and the overall length of the code word after encoding.
  • a typical BCH code applied to a sector of 512 bytes (4096 bits) of data can correct up to four error bits, if at least 60 ECC or parity bits are used.
  • Reed-Solomon codes are a subset of BCH codes, and are also commonly used for error correction.
  • a typical Reed-Solomon code can correct up to four errors in a 512 byte sector of data, using about 72 ECC bits.
  • error correction coding provides substantial improvement in manufacturing yield, as well as in the reliability of the flash memory over time.
  • Memory Controller 120 receives host data, also referred to as information bits, that is to be stored in memory cells of non-volatile three dimensional memory structure 202 .
  • Other techniques can be used that map input data to output data in more complex manners.
  • LDPC codes low density parity check (LDPC) codes
  • Gallager codes can be used. More details about LDPC codes can be found in R. G. Gallager, “Low-density parity-check codes,” IRE Trans. Inform. Theory, vol. IT-8, pp. 21 28, January 1962; and D. MacKay, Information Theory, Inference and Learning Algorithms, Cambridge University Press 2003, chapter 47.
  • LDPC codes are typically applied to multiple pages encoded across a number of storage elements, but they do not need to be applied across multiple pages.
  • the data bits can be mapped to a logical page and stored in non-volatile three dimensional memory structure 202 by programming one or more memory cells to one or more data states, which corresponds to v.
  • an iterative probabilistic decoding process which implements error correction decoding corresponding to the encoding implemented in Memory Controller 120 (or on control die 211 ). Further details regarding iterative probabilistic decoding can be found in the above-mentioned D. MacKay text.
  • the iterative probabilistic decoding attempts to decode a code word read from the memory by assigning initial probability metrics to each bit in the code word.
  • the probability metrics indicate a reliability of each bit, that is, how likely it is that the bit is not in error.
  • the probability metrics are logarithmic likelihood ratios (LLRs) which are obtained from LLR tables. LLR values are measures of the reliability with which the values of various binary bits read from the storage elements are known.
  • the LLR for a bit is given by
  • Adjusting the LLRs can result in flipping a bit (e.g., from 0 to 1 or from 1 to 0) in some, but not all, cases.
  • the flipping of bits can be thought of as correcting a bit or correcting an error in the data sensed from the memory cells.
  • another parity check is applied to the code word, if applicable, once the parity check in question has been satisfied.
  • the process moves to the next parity check, looping back to the failed check at a later time. The process continues in an attempt to satisfy all parity checks.
  • the decoding process of Y is completed to obtain the decoded information including parity bits v and the decoded information bits i.
  • Step 912 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the upper tails.
  • the error bits are identified in step 902 and/or step 908 by the ECC process.
  • FIG. 11 A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the upper tails 1106 and 1108 .
  • Region 1106 is the upper tail for the threshold voltage distribution for data state Er (the erased state).
  • Region 1108 is the upper tail for the threshold voltage distribution for data state D.
  • step 912 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1106 and 1108 .
  • Step 916 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the lower tails.
  • FIG. 11 A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the lower tails 1102 and 1104 .
  • Region 1102 is the lower tail for the threshold voltage distribution for data state A.
  • Region 1104 is the lower tail for the threshold voltage distribution for data state E.
  • step 916 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1102 and 1104 .
  • FIG. 11 B depicts the threshold voltage distributions after lowering threshold voltages of memory cells in upper tails (step 914 ) and raising threshold voltages in lower tails (step 918 ).
  • Regions (lower tails) 1102 and 1104 have become narrower due to the raising of threshold voltages in step 918 and, therefore, are labelled as 1102 ′ and 1104 ′.
  • Regions (upper tails) 1106 and 1108 have become narrower due to the lowering of threshold voltages in step 914 and, therefore, are labelled as 1106 ′ and 1108 ′.
  • the narrowing of regions 1102 ′, 1104 ′, 1106 ′ and 1108 ′ indicates a reduction in the number of error bits.
  • FIGS. 12 A and 12 B depict a subset of the set of overlapping threshold voltage distributions for the set of data states Er-G depicted in FIG. 5 D .
  • the teaching of FIGS. 12 A and 12 B explain steps 912 - 918 when data is read from the middle page (e.g., which requires sensing at VrB, VrD and VrF during steps 902 / 908 / 920 ).
  • FIG. 12 A depicts the threshold voltage distributions after performing step 902 of FIG. 9 (and/or after performing step 908 of FIG. 9 ) and prior to performing step 912 of FIG. 9 .
  • FIG. 12 B depicts the threshold voltage distributions after performing step 918 of FIG. 9 .
  • Step 912 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the upper tails.
  • the error bits are identified in step 902 and/or step 908 by the ECC process.
  • FIG. 12 A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the upper tails 1212 , 1214 and 1216 .
  • Region 1212 is the upper tail for the threshold voltage distribution for data state A.
  • Region 1214 is the upper tail for the threshold voltage distribution for data state C.
  • Region 1216 is the upper tail for the threshold voltage distribution for data state E.
  • step 912 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1212 , 1214 and 1216 .
  • Step 916 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the lower tails.
  • FIG. 12 A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the lower tails 1202 , 1204 and 1206 .
  • Region 1202 is the lower tail for the threshold voltage distribution for data state B.
  • Region 1204 is the lower tail for the threshold voltage distribution for data state D.
  • Region 1206 is the lower tail for the threshold voltage distribution for data state F.
  • step 916 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1202 , 1204 and 1206 .
  • FIG. 12 B depicts the threshold voltage distributions after lowering threshold voltages of memory cells in upper tails (step 914 ) and raising threshold voltages in lower tails (step 918 ).
  • Regions (lower tails) 1202 , 1204 and 1206 have become narrower due to the raising of threshold voltages in step 918 and, therefore, are labelled as 1202 ′, 1204 ′ and 1206 ′.
  • Regions (upper tails) 1212 , 1214 and 1216 have become narrower due to the lowering of threshold voltages in step 914 and, therefore, are labelled as 1212 ′, 1214 ′ and 1216 ′.
  • the narrowing of regions 1202 ′, 1204 ′, 1206 ′, 1212 ′, 1214 ′ and 1216 ′ indicates a reduction in the number of error bits.
  • Step 912 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the upper tails.
  • the error bits are identified in step 902 and/or step 908 by the ECC process.
  • FIG. 13 A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the upper tails 1306 and 1308 .
  • Region 1306 is the upper tail for the threshold voltage distribution for data state B.
  • Region 1308 is the upper tail for the threshold voltage distribution for data state F.
  • step 912 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1306 and 1308 .
  • Step 916 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the lower tails.
  • FIG. 13 A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the lower tails 1302 and 1304 .
  • Region 1302 is the lower tail for the threshold voltage distribution for data state B.
  • Region 1304 is the lower tail for the threshold voltage distribution for data state G.
  • step 916 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1302 and 1304 .
  • FIG. 13 B depicts the threshold voltage distributions after lowering threshold voltages of memory cells in upper tails (step 914 ) and raising threshold voltages in lower tails (step 918 ).
  • Regions (lower tails) 1302 and 1304 have become narrower due to the raising of threshold voltages in step 918 and, therefore, are labelled as 1302 ′ and 1304 ′.
  • Regions (upper tails) 1306 and 1308 have become narrower due to the lowering of threshold voltages in step 914 and, therefore, are labelled as 1306 ′ and 1308 ′.
  • the narrowing of regions 1302 ′, 1304 ′, 1306 ′ and 1308 ′ indicates a reduction in the number of error bits.
  • FIG. 14 is a bit level erase signal timing diagram that describes one example implementation of the lowering of threshold voltages of the identified memory cells as part of step 914 of FIG. 9 .
  • FIG. 14 depicts the following signals: Sel BL, Unsel BL, Sel SGDT 0 / 1 , Unsel SGDT 0 / 1 , SGD 0 / 1 , DD 0 / 1 , WL 0 to WLx ⁇ 1, WLx, WLx+1 to WL 161 , DS 0 / 1 , SGS 0 / 1 , SGSB 0 / 1 , and SL.
  • the signal Sel BL is the voltage applied to all of the bit lines connected to NAND strings having a memory cell identified in step 912 to be storing an error bit for the data set and have a threshold voltage in an upper tail.
  • the signal Unsel BL is the voltage applied to all of the bit lines connected to NAND strings not having a memory cell identified in step 912 to be storing an error bit for the data set and have a threshold voltage in an upper tail.
  • the signal Sel SGDT 0 / 1 is the voltage applied to SGDT 0 and SGDT 1 for the region (e.g., 430 , 440 , 450 , 460 , 470 ) selected for performing the process of step 914 .
  • the signal Unsel SGDT 0 / 1 is the voltage applied to SGDT 0 and SGDT 1 for the regions that are not selected for performing the process of step 914 .
  • the signal SGD 0 / 1 is the voltage applied to SGD 0 and SGD 1 for all regions (e.g., 430 , 440 , 450 , 460 , 470 ) of the selected block.
  • SGD 0 / 1 is the voltage applied to SGD 0 - s 0 , SGD 1 - s 0 , SGD 0 - s 1 , SGD 1 - s 1 , SGD 0 - s 2 , SGD 1 - s 2 , SGD 0 - s 3 , SGD 1 - s 3 , SGD 0 - s 4 , and SGD 1 - s 4 .
  • the signal DD 0 / 1 is the voltage applied to DD 0 and DD 1 .
  • the signal WLx is the voltage applied to the selected word line (the word line connected to the memory cells that will have threshold voltages adjusted).
  • the signal WL 0 to WLx+1 is the voltage applied to unselected word lines on the source side of the selected word line.
  • the signal WLx+1 to WL 161 is the voltage applied to unselected word lines on the drain side of the selected word line.
  • the signal DS 0 / 1 is the voltage applied to DS 0 and DS 1 (dummy word lines connected to dummy memory cvells).
  • the signal SGS 0 / 1 is the voltage applied to SGS 0 and SGS 1 for all regions (e.g., 430 , 440 , 450 , 460 , 470 ) of the selected block.
  • the signal SGSB 0 / 1 is the voltage applied to SGSB 0 and SGSB 1 for all regions (e.g., 430 , 440 , 450 , 460 , 470 ) of the selected block.
  • the signal SL is the voltage applied to the source line SL.
  • Vss ground or Ov
  • Sel BL is raised to Vdestate (e.g., 18 volts).
  • Vdestate is an example of the erase voltage.
  • FIG. 14 shows Vdestate applied to Sel BL as a voltage pulse, other waveforms can also be used.
  • Unsel BL is raised to Vdestate-7.6v
  • Sel SGDT 0 / 1 is raised to Vdestate-11.2v
  • Unsel SGDT 0 / 1 is raised to Vdestate
  • SGD 0 / 1 is raised to Vdestate-7.6v
  • DD 0 / 1 is raised to Vdestate-10.4v
  • WL 0 to WLx ⁇ 1 is raised to Vdestate-7.6v
  • WLx+1 to WL 161 is raised to Vdestate-7.6v
  • WLx remains at 0v (or close to 0v)
  • DS 0 / 1 is raised to Vdestate-10.4v
  • SGS 0 / 1 is raised to Vdestate-10.v
  • SGSB 0 / 1 is raised to Vdestate-10.4v
  • SL is floating. All signals will return to Vss (ground or 0v).
  • the voltage conditions of FIG. 14 cause GIDL to occur at the drain side (at SGDT 0 and/or SGDT 1 ) for NAND strings having a memory cell identified in step 912 to be storing an error bit for the data set and having a threshold voltage in an upper tail.
  • the voltage conditions of FIG. 14 also inhibit GIDL from happening in NAND strings not having a memory cell identified in step 912 to be storing an error bit for the data set and having a threshold voltage in an upper tail.
  • the GIDL causes holes to be generated in the channel of the respected NAND strings and these holes will enter the corresponding charge trapping layer 493 to lower the threshold voltages of memory cells to be corrected.
  • Steps 806 and 912 / 916 include identifying memory cells in upper tails and lower tails of overlapping threshold voltages distributions.
  • the identification of memory cells in upper tails and lower tails of overlapping threshold voltages distributions can be determined on the memory die using a series of latch based operations (as will be discussed in more detail below.
  • the lower page data LP is stored in XDL.
  • the calculated lower page data LP is then stored in XDL.
  • Step 1702 is performed for each memory cell being read. In step 1702 , performing the E Read sensing and the A read sensing correspond to step 1604 , and performing the C read sensing corresponds to step 1606 .
  • Step 1702 is performed on and by the memory die (e.g., memory die 200 or integrated memory assembly 207 ).
  • Step 2102 of FIG. 21 includes the memory die performing four sensing operations.
  • the memory die performs a F read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrF.
  • the results of the F read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310 ) to the SDL latch. If the memory cell being read has its threshold voltage less than VrF, then a “1” is stored in SDL. If the memory cell being read has its threshold voltage greater than VrF, then a “O” is stored in SDL.
  • the memory die performs an B read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrB.
  • the results of the B read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310 ) to the CDL latch. If the memory cell being read has its threshold voltage less than VrB, then a “1” is stored in CDL. If the memory cell being read has its threshold voltage greater than VrB, then a “0” is stored in CDL.
  • the voltage VrB can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrB then a 1 is stored in CDL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in CDL.
  • Steps 2110 and 2114 (corresponding to steps 1616 - 1620 ) comprises the memory die identifying memory cells in one or more tails of one or more threshold voltage distributions and adjusting those memory cells that are identified to be in a tail of a threshold voltage distribution.
  • the error_bits received by the memory die in step 2108 is first received at and stored in the XDL latches.
  • step 2110 the contents of the XDL latches (ie error_bits) are moved to SDL latches.
  • error bits For the middle page of data, there are six sets of error bits: (1) B-to-A error bits; (2) A-to-B error bits; (3) D-to-C error bits; (4) C-to-D error bits; (5) E-to-F error bits; and (6) F-to-E error bits.
  • B-to-A error bits are memory cells that should be in data state B but have threshold voltages that put them in state A (e.g., they are in a lower tail of the threshold voltage distribution for data state B);
  • A-to-B error bits are memory cells that should be in data state A but have threshold voltages that put them in state B (e.g., they are in an upper tail of the threshold voltage distribution for data state A);
  • D-to-C error bits are memory cells that should be in data state D but have threshold voltages that put them in state C (e.g., they are in a lower tail of the threshold voltage distribution for data state D);
  • C-to-D error bits are memory cells that should be in data state C but have threshold voltages that put them in state D (e.g., they are in an upper tail of the threshold voltage distribution for data state C);
  • E-to-F error bits are memory cells that should be in data state E but have threshold voltages that put them in state F (e.g., they are in an upper tail of the threshold voltage
  • D-to-C error bits After identifying D-to-C error bits, D-to-C error bits have their threshold voltages raised (see also step 918 and step 1624 ); for example, using the process of FIG. 15 . Note that BDL was storing the data from the C read sensing, and is used to distinguish between D-to-C error bits and other error_bits in data state B and data state C.
  • step 2112 the memory die preforms two sensing operations: F read sensing (results stores in BDL) and E read sensing (results stored in CDL).
  • F read sensing corresponds to step 1604
  • E read sensing corresponds to step 1606 .
  • FIG. 22 depicts waveforms of the voltage applied to the control gates of memory cells being read.
  • FIG. 22 shows three waveforms: (1) the Standard Middle Page Read waveform, (2) the Proposed Middle Page First Read for In-Place Error Correction waveform and (3) the Proposed Middle Page Second Read for In-Place Error Correction waveform.
  • the Standard Middle Page Read waveform is applied to the control gates of the memory cells being read via the word line connected to those memory cells being read in prior art read processes.
  • the Proposed Middle Page First Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read via the word line connected to those memory cells being read when performing step 2102 .
  • step 2102 includes sensing at VrF, VrD, VrC and VrB; therefore, the Proposed Middle Page First Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read (after a Vread spike) is set to VrF, then VrD, then VrC and then VrB.
  • the Proposed Middle Page Second Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read via the word line connected to those memory cells being read when performing step 2112 .
  • step 2112 includes sensing at VrF and VrE; therefore, the Proposed Middle Page Second Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read (after a Vread spike) is set to VrF and then VrE.
  • a non-volatile memory has been proposed that reduces errors in data stored by identifying memory cells in upper tails and lower tails of the overlapping threshold voltages distributions and adjusting threshold voltages of the identified memory cells to be closer to centers of the overlapping threshold voltages distributions without changing threshold voltages distributions for the identified memory cells.
  • the proposed system only needs two data transfers (one transfer of data read from the memory die to the memory controller and one identification of error bits in the data read from the memory controller to the memory die), which reduces data transfer time. Much of the logic operation is performed on the memory die, enabling faster error correction.
  • One embodiment includes a non-volatile storage apparatus, comprising a set of non-volatile memory cells and a control circuit connected to the non-volatile memory cells.
  • the control circuit is configured to: read data from the set of non-volatile memory cells, transfer the data read to an off-die circuit, receive from the off-die circuit an identification of error bits in the data read, based on the received identification of error bits in the data read, identify memory cells in the set of non-volatile memory cells that are in an upper tail of a first threshold voltage distribution, based on the received identification of error bits in the data read, identify memory cells in the set of non-volatile memory cells that are in a lower tail of a second threshold voltage distribution, and adjust memory cells that are identified to be in the upper tail of the first threshold voltage distribution and memory cells that are identified to be in the lower tail of the second threshold voltage distribution.
  • control circuit is configured to persistently maintain the memory cells in the set of non-volatile memory cells that are in the lower tail of the second threshold voltage distribution after the raising; and the control circuit is configured to persistently maintain the memory cells in the set of non-volatile memory cells that are in the upper tail of a first threshold voltage distribution after the lowering.
  • the off-die circuit is a memory controller on a separate die from the control circuit.
  • One example implementation further comprises a memory controller.
  • the memory controller is the off-die circuit.
  • the memory controller is configured to perform an error correction process on the data read that was transferred from the control circuit, identify error bits in the data read, and transfer an identification of the error bits in the data read to the control circuit.
  • control circuit is configured to determine that the data was not read successfully; and the control circuit is configured to identify memory cells in the set of non-volatile memory cells that are in the upper tail of the first threshold voltage distribution and identify memory cells in the set of non-volatile memory cells that are in the lower tail of the second threshold voltage distribution in response to determining that the data was not read successfully.
  • a center of the first threshold voltage distribution is higher in voltage magnitude than a center of the second threshold voltage distribution.
  • One example implementation further comprises: persistently maintaining the memory cells that are in the lower tail of the second threshold voltage distribution after the raising; and persistently maintaining the memory cells that are in the upper tail of a first threshold voltage distribution after the lowering.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Read Only Memory (AREA)

Abstract

In response to determining that a data set was not read successfully, the system identifies memory cells storing error bits that are in upper tails and lower tails of the threshold voltages distributions. To reduce the number of errors, memory cells storing error bits that are in upper tails have their threshold voltages reduced by bit level erase and memory cells storing error bits that are in lower tails have their threshold voltages increased by bit level program. The identification of which memory cells with error bits are in upper tails and lower tails can be determined on the memory die using a series of latch based operations.

Description

    BACKGROUND
  • The present disclosure relates to non-volatile storage.
  • Semiconductor memory is widely used in various electronic devices such as cellular telephones, digital cameras, personal digital assistants, medical electronics, mobile computing devices, servers, solid state drives, non-mobile computing devices and other devices. Semiconductor memory may comprise non-volatile memory or volatile memory. Non-volatile memory allows information to be stored and retained even when the non-volatile memory is not connected to a source of power (e.g., a battery). One example of non-volatile memory is flash memory (e.g., NAND-type and NOR-type flash memory).
  • Users of non-volatile memory can program (e.g., write) data to the non-volatile memory and later read that data back. For example, a digital camera may take a photograph and store the photograph in non-volatile memory. Later, a user of the digital camera may view the photograph by having the digital camera read the photograph from the non-volatile memory. Because users often rely on the data they store, it is important to users of non-volatile memory that the non-volatile memory operate reliably (e.g., user be able to successfully read back data stored in the non-volatile memory).
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Like-numbered elements refer to common components in the different figures.
  • FIG. 1 is a block diagram depicting one embodiment of a storage system.
  • FIG. 2A is a block diagram of one embodiment of a memory die.
  • FIG. 2B is a block diagram of one embodiment of an integrated memory assembly.
  • FIG. 2C depicts details of an individual sense block.
  • FIGS. 3A and 3B depict different embodiments of integrated memory assemblies.
  • FIG. 4 is a perspective view of a portion of one embodiment of a monolithic three dimensional memory structure.
  • FIG. 4A is a block diagram of one embodiment of a memory structure having two planes.
  • FIG. 4B depicts a top view of a portion of one embodiment of a block of memory cells.
  • FIG. 4C depicts a cross sectional view of a portion of one embodiment of a block of memory cells.
  • FIG. 4D depicts a cross sectional view of a portion of one embodiment of a block of memory cells.
  • FIG. 4E is a cross sectional view of one embodiment of a vertical column of memory cells.
  • FIG. 4F is a schematic of a plurality of NAND strings in multiple regions of a same block.
  • FIG. 5A depicts threshold voltage distributions.
  • FIG. 5B depicts threshold voltage distributions.
  • FIG. 5C depicts threshold voltage distributions.
  • FIG. 5D depicts threshold voltage distributions.
  • FIG. 5E depicts threshold voltage distributions.
  • FIG. 6 is a flow chart describing one embodiment of a process for programming non-volatile memory.
  • FIG. 7 is a timing diagram describing one embodiment of a read operation.
  • FIG. 8 is a flow chart describing on embodiment of a process for reading.
  • FIG. 9 is a flow chart describing on embodiment of a process for reading.
  • FIGS. 10A and 10B depict a set of overlapping threshold voltage distributions for a set of data states.
  • FIGS. 11A and 11B depict a set of overlapping threshold voltage distributions for a set of data states.
  • FIGS. 12A and 12B depict a set of overlapping threshold voltage distributions for a set of data states.
  • FIGS. 13A and 13B depict a set of overlapping threshold voltage distributions for a set of data states.
  • FIG. 14 is a bit level erase timing diagram describing one embodiment of a process for only lowering threshold voltages of selected memory cells without raising or lowering threshold voltages of other memory cells.
  • FIG. 15 is a bit level program timing diagram describing one embodiment of a process for only raising threshold voltages of selected memory cells without raising or lowering threshold voltages of other memory cells.
  • FIG. 16 is a flow chart describing one embodiment of a process for reading.
  • FIG. 17 is a flow chart describing one embodiment of a process for reading a page of data.
  • FIG. 18 depicts waveforms of the voltage applied to the control gates of memory cells being read.
  • FIG. 19 is a flow chart describing one embodiment of a process for reading a page of data.
  • FIG. 20 depicts waveforms of the voltage applied to the control gates of memory cells being read.
  • FIG. 21 is a flow chart describing one embodiment of a process for reading a page of data.
  • FIG. 22 depicts waveforms of the voltage applied to the control gates of memory cells being read.
  • DETAILED DESCRIPTION
  • In response to determining that a data set was not read successfully, the system identifies memory cells storing error bits that are in upper tails and lower tails of threshold voltages distributions. To reduce the number of errors, memory cells storing error bits that are in upper tails have their threshold voltages reduced to move the memory cells closer to the center of their respective threshold voltages distributions by bit level erase and memory cells storing error bits that are in lower tails have their threshold voltages increased to move the memory cells closer to the center of their respective threshold voltages distributions by bit level program. The identification of which memory cells (with error bits) are in upper tails and lower tails can be determined on the memory die using a series of latch based operations, as described below.
  • FIG. 1 is a block diagram of one embodiment of a storage system 100 that implements the proposed technology described herein. In one embodiment, storage system 100 is a solid state drive (“SSD”). Storage system 100 can also be a memory card, USB drive or other type of storage system. The proposed technology is not limited to any one type of memory system. Storage system 100 is connected to host 102, which can be a computer, server, electronic device (e.g., smart phone, tablet or other mobile device), appliance, or another apparatus that uses memory and has data processing capabilities. In some embodiments, host 102 is separate from, but connected to, storage system 100. In other embodiments, storage system 100 is embedded within host 102.
  • The components of storage system 100 depicted in FIG. 1 are electrical circuits. Storage system 100 includes a memory controller 120 connected to non-volatile memory 130 and local high speed volatile memory 140 (e.g., DRAM). Local high speed volatile memory 140 is used by memory controller 120 to perform certain functions. For example, local high speed volatile memory 140 stores logical to physical address translation tables (“L2P tables”).
  • Memory controller 120 comprises a host interface 152 that is connected to and in communication with host 102. In one embodiment, host interface 152 implements a NVM Express (NVMe) over PCI Express (PCIe). Other interfaces can also be used, such as SCSI, SATA, etc. Host interface 152 is also connected to a network-on-chip (NOC) 154. A NOC is a communication subsystem on an integrated circuit. NOC's can span synchronous and asynchronous clock domains or use unclocked asynchronous logic. NOC technology applies networking theory and methods to on-chip communications and brings notable improvements over conventional bus and crossbar interconnections. NOC improves the scalability of systems on a chip (SoC) and the power efficiency of complex SoCs compared to other designs. The wires and the links of the NOC are shared by many signals. A high level of parallelism is achieved because all links in the NOC can operate simultaneously on different data packets. Therefore, as the complexity of integrated subsystems keep growing, a NOC provides enhanced performance (such as throughput) and scalability in comparison with previous communication architectures (e.g., dedicated point-to-point signal wires, shared buses, or segmented buses with bridges). In other embodiments, NOC 154 can be replaced by a bus. Connected to and in communication with NOC 154 is processor 156, ECC engine 158, memory interface 160, and DRAM controller 164. DRAM controller 164 is used to operate and communicate with local high speed volatile memory 140 (e.g., DRAM). In other embodiments, local high speed volatile memory 140 can be SRAM or another type of volatile memory.
  • ECC engine 158 performs error correction services. For example, ECC engine 158 performs data encoding and decoding, as per the implemented ECC technique. In one embodiment, ECC engine 158 is an electrical circuit programmed by software. For example, ECC engine 158 can be a processor that can be programmed. In other embodiments, ECC engine 158 is a custom and dedicated hardware circuit without any software. In another embodiment, the function of ECC engine 158 is implemented by processor 156.
  • Processor 156 performs the various controller memory operations, such as programming, erasing, reading, and memory management processes. In one embodiment, processor 156 is programmed by firmware. In other embodiments, processor 156 is a custom and dedicated hardware circuit without any software. Processor 156 also implements a translation module, as a software/firmware process or as a dedicated hardware circuit. In many systems, the non-volatile memory is addressed internally to the storage system using physical addresses associated with the one or more memory die. However, the host system will use logical addresses to address the various memory locations. This enables the host to assign data to consecutive logical addresses, while the storage system is free to store the data as it wishes among the locations of the one or more memory die. To implement this system, memory controller 120 (e.g., the translation module) performs address translation between the logical addresses used by the host and the physical addresses used by the memory dies. One example implementation is to maintain tables (i.e., the L2P tables mentioned above) that identify the current translation between logical addresses and physical addresses. An entry in the L2P table may include an identification of a logical address and corresponding physical address. Although logical address to physical address tables (or L2P tables) include the word “tables” they need not literally be tables. Rather, the logical address to physical address tables (or L2P tables) can be any type of data structure. In some examples, the memory space of a storage system is so large that the local memory 140 cannot hold all of the L2P tables. In such a case, the entire set of L2P tables are stored in a memory die 130 and a subset of the L2P tables are cached (L2P cache) in the local high speed volatile memory 140.
  • Memory interface 160 communicates with non-volatile memory 130. In one embodiment, memory interface provides a Toggle Mode interface. Other interfaces can also be used. In some example implementations, memory interface 160 (or another portion of controller 120) implements a scheduler and buffer for transmitting data to and receiving data from one or more memory die.
  • In one embodiment, non-volatile memory 130 comprises one or more memory die. FIG. 2A is a functional block diagram of one embodiment of a memory die 200 that comprises non-volatile memory 130. Each of the one or more memory die of non-volatile memory 130 can be implemented as memory die 200 of FIG. 2A. The components depicted in FIG. 2A are electrical circuits. Memory die 200 includes a memory array 202 that can comprises non-volatile memory cells, as described in more detail below. The array terminal lines of memory array 202 include the various layer(s) of word lines organized as rows, and the various layer(s) of bit lines organized as columns. However, other orientations can also be implemented. Memory die 200 includes row control circuitry 220, whose outputs 208 are connected to respective word lines of the memory array 202. Row control circuitry 220 receives a group of M row address signals and one or more various control signals from System Control Logic circuit 260, and typically may include such circuits as row decoders 222, array terminal drivers 224, and block select circuitry 226 for both reading and writing (programming) operations. Row control circuitry 220 may also include read/write circuitry. Memory die 200 also includes column control circuitry 210 including sense amplifier(s) 230 whose input/outputs 206 are connected to respective bit lines of the memory array 202. Although only single block is shown for array 202, a memory die can include multiple arrays that can be individually accessed. Column control circuitry 210 receives a group of N column address signals and one or more various control signals from System Control Logic 260, and typically may include such circuits as column decoders 212, array terminal receivers or driver circuits 214, block select circuitry 216, as well as read/write circuitry, and I/O multiplexers.
  • System control logic 260 receives data and commands from memory controller 120 and provides output data and status to the host. In some embodiments, the system control logic 260 (which comprises one or more electrical circuits) include state machine 262 that provides die-level control of memory operations. In one embodiment, the state machine 262 is programmable by software. In other embodiments, the state machine 262 does not use software and is completely implemented in hardware (e.g., electrical circuits). In another embodiment, the state machine 262 is replaced by a micro-controller or microprocessor, either on or off the memory chip. System control logic 262 can also include a power control module 264 that controls the power and voltages supplied to the rows and columns of the memory structure 202 during memory operations and may include charge pumps and regulator circuit for creating regulating voltages. System control logic 262 includes storage 366 (e.g., RAM, registers, latches, etc.), which may be used to store parameters for operating the memory array 202.
  • Commands and data are transferred between memory controller 120 and memory die 200 via memory controller interface 268 (also referred to as a “communication interface”). Memory controller interface 268 is an electrical interface for communicating with memory controller 120. Examples of memory controller interface 268 include a Toggle Mode Interface and an Open NAND Flash Interface (ONFI). Other I/O interfaces can also be used.
  • In some embodiments, all the elements of memory die 200, including the system control logic 260, can be formed as part of a single die. In other embodiments, some or all of the system control logic 260 can be formed on a different die.
  • In one embodiment, memory structure 202 comprises a three-dimensional memory array of non-volatile memory cells in which multiple memory levels are formed above a single substrate, such as a wafer. The memory structure may comprise any type of non-volatile memory that are monolithically formed in one or more physical levels of memory cells having an active area disposed above a silicon (or other type of) substrate. In one example, the non-volatile memory cells comprise vertical NAND strings with charge-trapping layers.
  • In another embodiment, memory structure 302 comprises a two-dimensional memory array of non-volatile memory cells. In one example, the non-volatile memory cells are NAND flash memory cells utilizing floating gates. Other types of memory cells (e.g., NOR-type flash memory) can also be used.
  • The exact type of memory array architecture or memory cell included in memory structure 202 is not limited to the examples above. Many different types of memory array architectures or memory technologies can be used to form memory structure 202. No particular non-volatile memory technology is required for purposes of the new claimed embodiments proposed herein. Other examples of suitable technologies for memory cells of the memory structure 202 include ReRAM memories (resistive random access memories), magnetoresistive memory (e.g., MRAM, Spin Transfer Torque MRAM, Spin Orbit Torque MRAM), FeRAM, phase change memory (e.g., PCM), and the like. Examples of suitable technologies for memory cell architectures of the memory structure 202 include two dimensional arrays, three dimensional arrays, cross-point arrays, stacked two dimensional arrays, vertical bit line arrays, and the like.
  • One example of a ReRAM cross-point memory includes reversible resistance-switching elements arranged in cross-point arrays accessed by X lines and Y lines (e.g., word lines and bit lines). In another embodiment, the memory cells may include conductive bridge memory elements. A conductive bridge memory element may also be referred to as a programmable metallization cell. A conductive bridge memory element may be used as a state change element based on the physical relocation of ions within a solid electrolyte. In some cases, a conductive bridge memory element may include two solid metal electrodes, one relatively inert (e.g., tungsten) and the other electrochemically active (e.g., silver or copper), with a thin film of the solid electrolyte between the two electrodes. As temperature increases, the mobility of the ions also increases causing the programming threshold for the conductive bridge memory cell to decrease. Thus, the conductive bridge memory element may have a wide range of programming thresholds over temperature.
  • Another example is magnetoresistive random access memory (MRAM) that stores data by magnetic storage elements. The elements are formed from two ferromagnetic layers, each of which can hold a magnetization, separated by a thin insulating layer. One of the two layers is a permanent magnet set to a particular polarity; the other layer's magnetization can be changed to match that of an external field to store memory. A memory device is built from a grid of such memory cells. In one embodiment for programming, each memory cell lies between a pair of write lines arranged at right angles to each other, parallel to the cell, one above and one below the cell. When current is passed through them, an induced magnetic field is created. MRAM based memory embodiments will be discussed in more detail below.
  • Phase change memory (PCM) exploits the unique behavior of chalcogenide glass. One embodiment uses a GeTe—Sb2Te3 super lattice to achieve non-thermal phase changes by simply changing the co-ordination state of the Germanium atoms with a laser pulse (or light pulse from another source). Therefore, the doses of programming are laser pulses. The memory cells can be inhibited by blocking the memory cells from receiving the light. In other PCM embodiments, the memory cells are programmed by current pulses. Note that the use of “pulse” in this document does not require a square pulse but includes a (continuous or non-continuous) vibration or burst of sound, current, voltage light, or another wave. These memory elements within the individual selectable memory cells, or bits, may include a further series element that is a selector, such as an ovonic threshold switch or metal insulator substrate.
  • A person of ordinary skill in the art will recognize that the technology described herein is not limited to a single specific memory structure, memory construction or material composition, but covers many relevant memory structures within the spirit and scope of the technology as described herein and as understood by one of ordinary skill in the art.
  • The elements of FIG. 2A can be grouped into two parts: (1) memory structure 202 and (2) peripheral circuitry, which includes all of the other components depicted in FIG. 2A. An important characteristic of a memory circuit is its capacity, which can be increased by increasing the area of the memory die of storage system 100 that is given over to the memory structure 202; however, this reduces the area of the memory die available for the peripheral circuitry. This can place quite severe restrictions on these elements of the peripheral circuitry. For example, the need to fit sense amplifier circuits within the available area can be a significant restriction on sense amplifier design architectures. With respect to the system control logic 260, reduced availability of area can limit the available functionalities that can be implemented on-chip. Consequently, a basic trade-off in the design of a memory die for the storage system 100 is the amount of area to devote to the memory structure 202 and the amount of area to devote to the peripheral circuitry.
  • Another area in which the memory structure 202 and the peripheral circuitry are often at odds is in the processing involved in forming these regions, since these regions often involve differing processing technologies and the trade-off in having differing technologies on a single die. For example, when the memory structure 202 is NAND flash, this is an NMOS structure, while the peripheral circuitry is often CMOS based. For example, elements such sense amplifier circuits, charge pumps, logic elements in a state machine, and other peripheral circuitry in system control logic 260 often employ PMOS devices. Processing operations for manufacturing a CMOS die will differ in many aspects from the processing operations optimized for an NMOS flash NAND memory or other memory cell technologies.
  • To improve upon these limitations, embodiments described below can separate the elements of FIG. 2A onto separately formed dies that are then bonded together. More specifically, the memory structure 202 can be formed on one die (referred to as the memory die) and some or all of the peripheral circuitry elements, including one or more control circuits, can be formed on a separate die (referred to as the control die). For example, a memory die can be formed of just the memory elements, such as the array of memory cells of flash NAND memory, MRAM memory, PCM memory, ReRAM memory, or other memory type. Some or all of the peripheral circuitry, even including elements such as decoders and sense amplifiers, can then be moved on to a separate control die. This allows each of the memory die to be optimized individually according to its technology. For example, a NAND memory die can be optimized for an NMOS based memory array structure, without worrying about the CMOS elements that have now been moved onto a control die that can be optimized for CMOS processing. This allows more space for the peripheral elements, which can now incorporate additional capabilities that could not be readily incorporated were they restricted to the margins of the same die holding the memory cell array. The two die can then be bonded together in a bonded multi-die memory circuit, with the array on the one die connected to the periphery elements on the other die. Although the following will focus on a bonded memory circuit of one memory die and one control die, other embodiments can use more die, such as two memory die and one control die, for example.
  • FIG. 2B shows an alternative arrangement to that of FIG. 2A which may be implemented using wafer-to-wafer bonding to provide a bonded die pair. FIG. 2B depicts a functional block diagram of one embodiment of an integrated memory assembly 207. One or more integrated memory assemblies 207 may be used to implement the non-volatile memory 130 of storage system 100. The integrated memory assembly 207 includes two types of semiconductor die (or more succinctly, “die”). Memory die 201 includes memory structure 202. Memory structure 202 includes non-volatile memory cells. Control die 211 includes control circuitry 260, 210, and 220 (as described above). In some embodiments, control die 211 is configured to connect to the memory structure 202 in the memory die 201. In some embodiments, the memory die 201 and the control die 211 are bonded together.
  • FIG. 2B shows an example of the peripheral circuitry, including control circuits, formed in a peripheral circuit or control die 211 coupled to memory structure 202 formed in memory die 201. Common components are labelled similarly to FIG. 2A. System control logic 260, row control circuitry 220, and column control circuitry 210 are located in control die 211. In some embodiments, all or a portion of the column control circuitry 210 and all or a portion of the row control circuitry 220 are located on the memory die 201. In some embodiments, some of the circuitry in the system control logic 260 is located on the on the memory die 201.
  • System control logic 260, row control circuitry 220, and column control circuitry 210 may be formed by a common process (e.g., CMOS process), so that adding elements and functionalities, such as ECC, more typically found on a memory controller 120 may require few or no additional process steps (i.e., the same process steps used to fabricate controller 120 may also be used to fabricate system control logic 260, row control circuitry 220, and column control circuitry 210). Thus, while moving such circuits from a die such as memory 2 die 201 may reduce the number of steps needed to fabricate such a die, adding such circuits to a die such as control die 211 may not require many additional process steps. The control die 211 could also be referred to as a CMOS die, due to the use of CMOS technology to implement some or all of control circuitry 260, 210, 220.
  • FIG. 2B shows column control circuitry 210 including sense amplifier(s) 230 on the control die 211 coupled to memory structure 202 on the memory die 201 through electrical paths 206. For example, electrical paths 206 may provide electrical connection between column decoder 212, driver circuitry 214, and block select 216 and bit lines of memory structure 202. Electrical paths may extend from column control circuitry 210 in control die 211 through pads on control die 211 that are bonded to corresponding pads of the memory die 201, which are connected to bit lines of memory structure 202. Each bit line of memory structure 202 may have a corresponding electrical path in electrical paths 206, including a pair of bond pads, which connects to column control circuitry 210. Similarly, row control circuitry 220, including row decoder 222, array drivers 224, and block select 226 are coupled to memory structure 202 through electrical paths 208. Each of electrical path 208 may correspond to a word line, dummy word line, or select gate line. Additional electrical paths may also be provided between control die 211 and memory die 201.
  • For purposes of this document, the phrases “a control circuit” or “one or more control circuits” can include any one of or any combination of memory controller 120, state machine 262, all or a portion of system control logic 260, all or a portion of row control circuitry 220, all or a portion of column control circuitry 210, a microcontroller, a microprocessor, and/or other similar functioned circuits. The control circuit can include hardware only or a combination of hardware and software (including firmware). For example, a controller programmed by firmware to perform the functions described herein is one example of a control circuit. A control circuit can include a processor, FGA, ASIC, integrated circuit, or other type of circuit.
  • FIG. 2C is a block diagram depicting an individual sense block 302 of sense amplifiers 230 partitioned into a core portion 304 (referred to as a sense module 304) and a common portion 306. In one embodiment, there will be a separate sense module 304 for each bit line and one common portion 306 for a set of multiple sense modules 304. In one example, a sense block 302 will include one common portion 306 connected to eight, twelve, or sixteen sense modules 304. Each of the sense modules 304 in a group will communicate with the associated common portion 306 via a data bus 308. In one embodiment, sense amplifiers 230 will include many sense blocks 302.
  • Sense module 304 comprises sense circuitry 310 that determines whether a conduction current in a connected bit line is above or below a predetermined level or, in voltage based sensing, whether a voltage level in a connected bit line is above or below a predetermined level. The sense circuitry 310 is to receive control signals from the state machine via input lines 312. In some embodiments, sense circuitry 310 includes a circuit commonly referred to as a sense amplifier. Sense module 304 also includes a bit line latch 314 that is used to set a voltage condition on the connected bit line. For example, a predetermined state latched in bit line latch 314 will result in the connected bit line being pulled to a state designating program inhibit (e.g., VDD).
  • Common portion 306 comprises a processor 320, data latches 322 and an I/O Interface 324 coupled between the set of data latches 322 and data bus 326. Processor 320 performs computations. For example, one of its functions is to determine the data stored in the sensed memory cell and store the determined data in the set of data latches. The set of data latches 322 is used to store data bits determined by processor 320 during a read operation. It is also used to store data bits imported from the data bus 326 during a program operation. The imported data bits represent write data meant to be programmed into the memory. I/O interface 324 provides an interface between data latches 322 and the data bus 326.
  • During read or sensing, the operation of the system is under the control of state machine 262 that controls (using power control 264) the supply of different control gate or other bias voltages to the addressed memory cell(s). As it steps through the various predefined control gate voltages corresponding to the various memory states supported by the memory, the sense module 304 may trip at one of these voltages and an output will be provided from sense module 304 to processor 320 via bus 308. At that point, processor 320 determines the resultant memory state by consideration of the tripping event(s) of the sense module 304 and the information about the applied control gate voltage from the state machine via signal lines 490. It then computes a binary encoding for the memory state and stores the resultant data bits into data latches 322. In another embodiment, bit line latch 314 serves double duty, both as a latch for latching the output of the sense module 304 and also as a bit line latch as described above.
  • Data latch stack 322 contains a stack of data latches corresponding to an associated sense module 304. In one embodiment, there are three, four or another number of data latches per sense module 304. In one embodiment, the latches are each one bit (e.g., one bit per sense module 304). In one embodiment, the latches for each sense module 304 will be referred to as SDL, XDL, ADL, BDL, and CDL. Thus, in one embodiment, each sense module 304 has its own set of SDL, XDL, ADL, BDL, and CDL. In the embodiments discussed here, the latch XDL is a transfer latch used to exchange data with the I/O interface 324. In addition to a first sense amplifier data latch SDL, the additional latches ADL, BDL and CDL can be used to hold multi-state data, where the number of such latches typically reflects the number of bits stored in a memory cell. For example, in 3-bit per cell multi-level cell (MLC) memory format, the three sets of latches ADL, BDL, CDL can be used for upper, middle, lower page data. In a 2-bit per cell embodiment, only ADL and BDL might be used, while a 4-bit per cell embodiment might include a further set of DDL latches. In other embodiments, the XDL latches can be used to hold additional pages of data, such as a 4-bit per cell MLC embodiment that uses the XDL latches in addition to the three sets of latches ADL, BDL, CDL for four pages of data. The following discussion will mainly focus on a 3-bit per cell embodiment, as this can illustrate the main features but not get overly complicated, but the discussion can also be applied to embodiments with more or fewer bit per memory cell formats. In embodiments discussed below, the latches ADL, BDL, CDL, SDL and XDL can transfer data between themselves and the bit line latch 324.
  • In some embodiments data read from a memory cell or data to be programmed into a memory cell will first be stored in XDL. In case the data is to be programmed into a memory cell, the system can program the data into the memory cell from XDL. In one embodiment, the data is programmed into the memory cell entirely from XDL before the next operation proceeds. In other embodiments, as the system begins to program a memory cell through XDL, the system also transfers the data stored in XDL into ADL in order to reset XDL. Before data is transferred from XDL into ADL, the data kept in ADL is transferred to BDL, flushing out whatever data (if any) is being kept in BDL, and similarly for BDL and CDL. Once data has been transferred from XDL into ADL, the system continues (if necessary) to program the memory cell through ADL, while simultaneously loading the data to be programmed into a memory cell on the next word line into XDL, which has been reset. By performing the data load and programming operations simultaneously, the system can save time and thus perform a sequence of such operations faster.
  • During program or verify, the data to be programmed is stored in the set of data latches 322 from the data bus 326. During the verify process, Processor 320 monitors the verified memory state relative to the desired memory state. When the two are in agreement, processor 320 sets the bit line latch 314 so as to cause the bit line to be pulled to a state designating program inhibit. This inhibits the memory cell coupled to the bit line from further programming even if it is subjected to programming pulses on its control gate. In other embodiments the processor initially loads the bit line latch 468 and the sense circuitry sets it to an inhibit value during the verify process.
  • In some implementations (but not required), the data latches are implemented as a shift register so that the parallel data stored therein is converted to serial data for data bus 326, and vice versa. In one preferred embodiment, all the data latches corresponding to the read/write block of m memory cells can be linked together to form a block shift register so that a block of data can be input or output by serial transfer. In particular, the bank of read/write modules is adapted so that each of its set of data latches will shift data in to or out of the data bus in sequence as if they are part of a shift register for the entire read/write block.
  • In some embodiments, there is more than one control die 211 and more than one memory die 201 in an integrated memory assembly 207. In some embodiments, the integrated memory assembly 207 includes a stack of multiple control die 211 and multiple memory die 201. FIG. 3A depicts a side view of an embodiment of an integrated memory assembly 207 stacked on a substrate 271 (e.g., a stack comprising control dies 211 and memory dies 201). The integrated memory assembly 207 has three control dies 211 and three memory dies 201. In some embodiments, there are more than three memory dies 201 and more than three control die 211.
  • Each control die 211 is affixed (e.g., bonded) to at least one of the memory dies 201. Some of the bond pads 282/284 are depicted. There may be many more bond pads. A space between two dies 201, 211 that are bonded together is filled with a solid layer 280, which may be formed from epoxy or other resin or polymer. This solid layer 280 protects the electrical connections between the dies 201, 211, and further secures the dies together. Various materials may be used as solid layer 280, but in embodiments, it may be Hysol epoxy resin from Henkel Corp., having offices in California, USA.
  • The integrated memory assembly 207 may for example be stacked with a stepped offset, leaving the bond pads at each level uncovered and accessible from above. Wire bonds 270 connected to the bond pads connect the control die 211 to the substrate 271. A number of such wire bonds may be formed across the width of each control die 211 (i.e., into the page of FIG. 3A).
  • A memory die through silicon via (TSV) 276 may be used to route signals through a memory die 201. A control die through silicon via (TSV) 278 may be used to route signals through a control die 211. The TSVs 276, 278 may be formed before, during or after formation of the integrated circuits in the semiconductor dies 201, 211. The TSVs may be formed by etching holes through the wafers. The holes may then be lined with a barrier against metal diffusion. The barrier layer may in turn be lined with a seed layer, and the seed layer may be plated with an electrical conductor such as copper, although other suitable materials such as aluminum, tin, nickel, gold, doped polysilicon, and alloys or combinations thereof may be used.
  • Solder balls 272 may optionally be affixed to contact pads 274 on a lower surface of substrate 271. The solder balls 272 may be used to couple the integrated memory assembly 207 electrically and mechanically to a host device such as a printed circuit board. Solder balls 272 may be omitted where the integrated memory assembly 207 is to be used as an LGA package. The solder balls 272 may form a part of the interface between integrated memory assembly 207 and memory controller 120.
  • FIG. 3B depicts a side view of another embodiment of an integrated memory assembly 207 stacked on a substrate 271. The integrated memory assembly 207 of FIG. 3B has three control die 211 and three memory die 201. In some embodiments, there are many more than three memory dies 201 and many more than three control dies 211. In this example, each control die 211 is bonded to at least one memory die 201. Optionally, a control die 211 may be bonded to two or more memory die 201.
  • Some of the bond pads 282, 284 are depicted. There may be many more bond pads. A space between two dies 201, 211 that are bonded together is filled with a solid layer 280, which may be formed from epoxy or other resin or polymer. In contrast to the example in FIG. 3A, the integrated memory assembly 207 in FIG. 3B does not have a stepped offset. A memory die through silicon via (TSV) 276 may be used to route signals through a memory die 201. A control die through silicon via (TSV) 278 may be used to route signals through a control die 211.
  • Solder balls 272 may optionally be affixed to contact pads 274 on a lower surface of substrate 271. The solder balls 272 may be used to couple the integrated memory assembly 207 electrically and mechanically to a host device such as a printed circuit board. Solder balls 272 may be omitted where the integrated memory assembly 207 is to be used as an LGA package.
  • As has been briefly discussed above, the control die 211 and the memory die 201 may be bonded together. Bond pads on each die 201, 211 may be used to bond the two dies together. In some embodiments, the bond pads are bonded directly to each other, without solder or other added material, in a so-called Cu-to-Cu bonding process. In a Cu-to-Cu bonding process, the bond pads are controlled to be highly planar and formed in a highly controlled environment largely devoid of ambient particulates that might otherwise settle on a bond pad and prevent a close bond. Under such properly controlled conditions, the bond pads are aligned and pressed against each other to form a mutual bond based on surface tension. Such bonds may be formed at room temperature, though heat may also be applied. In embodiments using Cu-to-Cu bonding, the bond pads may be about 5 μm square and spaced from each other with a pitch of 5 μm to 5 μm. While this process is referred to herein as Cu-to-Cu bonding, this term may also apply even where the bond pads are formed of materials other than Cu.
  • When the area of bond pads is small, it may be difficult to bond the semiconductor dies together. The size of, and pitch between, bond pads may be further reduced by providing a film layer on the surfaces of the semiconductor dies including the bond pads. The film layer is provided around the bond pads. When the dies are brought together, the bond pads may bond to each other, and the film layers on the respective dies may bond to each other. Such a bonding technique may be referred to as hybrid bonding. In embodiments using hybrid bonding, the bond pads may be about 5 μm square and spaced from each other with a pitch of 1 μm to 5 μm. Bonding techniques may be used providing bond pads with even smaller (or greater) sizes and pitches.
  • Some embodiments may include a film on surface of the dies 201, 211. Where no such film is initially provided, a space between the dies may be under filled with an epoxy or other resin or polymer. The under-fill material may be applied as a liquid which then hardens into a solid layer. This under-fill step protects the electrical connections between the dies 201, 211, and further secures the dies together. Various materials may be used as under-fill material, but in embodiments, it may be Hysol epoxy resin from Henkel Corp., having offices in California, USA.
  • FIG. 4 is a perspective view of a portion of one example embodiment of a monolithic three dimensional memory array/structure that can comprise memory structure 202, which includes a plurality non-volatile memory cells arranged as vertical NAND strings. For example, FIG. 4 shows a portion 400 of one block of memory. The structure depicted includes a set of bit lines BL positioned above a stack 401 of alternating dielectric layers and conductive layers. For example purposes, one of the dielectric layers is marked as D and one of the conductive layers (also called word line layers) is marked as W. The number of alternating dielectric layers and conductive layers can vary based on specific implementation requirements. As will be explained below, in one embodiment the alternating dielectric layers and conductive layers are divided into four or five (or a different number of) regions by isolation regions IR. FIG. 4 shows one isolation region IR separating two regions. Below the alternating dielectric layers and word line layers is a source line layer SL. Memory holes are formed in the stack of alternating dielectric layers and conductive layers. For example, one of the memory holes is marked as MH. Note that in FIG. 4 , the dielectric layers are depicted as see-through so that the reader can see the memory holes positioned in the stack of alternating dielectric layers and conductive layers. In one embodiment, NAND strings are formed by filling the memory hole with materials including a charge-trapping material to create a vertical column of memory cells. Each memory cell can store one or more bits of data. Thus, the non-volatile memory cells are arranged in memory holes. More details of the three dimensional monolithic memory array that comprises memory structure 202 is provided below.
  • FIG. 4A is a block diagram explaining one example organization of memory structure 202, which is divided into two planes 402 and 404. Each plane is then divided into M blocks. In one example, each plane has about 2000 blocks. However, different numbers of blocks and planes can also be used. In one embodiment, a block of memory cells is a unit of erase. That is, all memory cells of a block are erased together. In other embodiments, blocks can be divided into sub-blocks and the sub-blocks can be the unit of erase. Memory cells can also be grouped into blocks for other reasons, such as to organize the memory structure to enable the signaling and selection circuits. In some embodiments, a block represents a groups of connected memory cells as the memory cells of a block share a common set of word lines. For example, the word lines for a block are all connected to all of the vertical NAND strings for that block. Although FIG. 4A shows two planes 402/404, more or less than two planes can be implemented. In some embodiments, memory structure 202 includes eight planes.
  • FIGS. 4B-4G depict an example three dimensional (“3D”) NAND structure that corresponds to the structure of FIG. 4 and can be used to implement memory structure 202 of FIGS. 2A and 2B. FIG. 4B is a block diagram depicting a top view of a portion 406 of Block 2 of plane 402. As can be seen from FIG. 4B, the block depicted in FIG. 4B extends in the direction of 432. In one embodiment, the memory array has many layers; however, FIG. 4B only shows the top layer.
  • FIG. 4B depicts a plurality of circles that represent the memory holes, which are also referred to as vertical columns. Each of the memory holes/vertical columns include multiple select transistors (also referred to as a select gate or selection gate) and multiple memory cells. In one embodiment, each memory hole/vertical column implements a NAND string. For example, FIG. 4B labels a subset of the memory holes/vertical columns/NAND strings 432, 436, 446. 456, 462, 466, 472, 474 and 476.
  • FIG. 4B also depicts a set of bit lines 415, including bit lines 411, 412, 413, 414, . . . 419. FIG. 4B shows twenty four bit lines because only a portion of the block is depicted. It is contemplated that more than twenty four bit lines connected to memory holes/vertical columns of the block. Each of the circles representing memory holes/vertical columns has an “x” to indicate its connection to one bit line. For example, bit line 411 is connected to memory holes/vertical columns 436, 446, 456, 466 and 476.
  • The block depicted in FIG. 4B includes a set of isolation regions 482, 484, 486 and 488, which are formed of SiO2; however, other dielectric materials can also be used. Isolation regions 482, 484, 486 and 488 serve to divide the top layers of the block into five regions; for example, the top layer depicted in FIG. 4B is divided into regions 430, 440, 450, 460 and 470. In one embodiment, the isolation regions only divide the layers used to implement select gates so that NAND strings in different regions can be independently selected. In one example implementation, a bit line connects to one memory hole/vertical column/NAND string in each of regions 430, 440, 450, 460 and 470. In that implementation, each block has twenty four rows of active columns and each bit line connects to five rows in each block. In one embodiment, all of the five memory holes/vertical columns/NAND strings connected to a common bit line are connected to the same set of word lines; therefore, the system uses the drain side select lines to choose one (or another subset) of the five to be subjected to a memory operation (program, verify, read, and/or erase).
  • FIG. 4B also shows Line Interconnects LI, which are metal connections to the source line SL from above the memory array. Line Interconnects LI are positioned adjacent regions 430 and 470.
  • Although FIG. 4B shows each region 430, 440, 450, 460 and 470 having four rows of memory holes/vertical columns, five regions and twenty four rows of memory holes/vertical columns in a block, those exact numbers are an example implementation. Other embodiments may include more or less regions per block, more or less rows of memory holes/vertical columns per region and more or less rows of vertical columns per block. FIG. 4B also shows the memory holes/vertical columns being staggered. In other embodiments, different patterns of staggering can be used. In some embodiments, the memory holes/vertical columns are not staggered.
  • FIG. 4C depicts a portion of one embodiment of a three dimensional memory structure 202 showing a cross-sectional view along line AA of FIG. 4B. This cross sectional view cuts through memory holes/vertical columns (NAND strings) 472 and 474 of region 470 (see FIG. 4B). The structure of FIG. 4C includes two drain side select layers SGD0 and SGD; teo source side select layers SGS0 and SGS1; two drain side GIDL generation transistor layers SGDT0 and SGDT1; two source side GIDL generation transistor layers SGSB0 and SGSB1; two drain side dummy word line layers DD0 and DD1; two source side dummy word line layers DS0 and DS1; dummy word line layers DU and DL; one hundred and sixty two word line layers WL0-WL161 for connecting to data memory cells, and dielectric layers DL. Other embodiments can implement more or less than the numbers described above for FIG. 4C. In one embodiment, SGD0 and SGD1 are connected together; and SGS0 and SGS1 are connected together. In other embodiments, more or less number of SGDs (greater or lesser than two) are connected together, and more or less number of SGSs (greater or lesser than two) connected together.
  • In one embodiment, erasing the memory cells is performed using gate induced drain leakage (GIDL), which includes generating charge carriers at the GIDL generation transistors such that the carriers get injected into the charge trapping layers of the NAND strings to change threshold voltage of the memory cells. FIG. 4C shows two GIDL generation transistors at each end of the NAND string; however, in other embodiments there are more or less than three. Embodiments that use GIDL at both sides of the NAND string may have GIDL generation transistors at both sides. Embodiments that use GIDL at only the drain side of the NAND string may have GIDL generation transistors only at the drain side. Embodiments that use GIDL at only the source side of the NAND string may have GIDL generation transistors only at the source side.
  • FIG. 4C shows two GIDL generation transistors at each end of the NAND string. It is likely that charge carriers are only generated by GIDL at one of the two GIDL generation transistors at each end of the NAND string. Based on process variances during manufacturing, it is likely that one of the two GIDL generation transistors at an end of the NAND string is best suited for GIDL. For example, the GIDL generation transistors have an abrupt pn junction to generate the charge carriers for GIDL and, during fabrication, a phosphorous diffusion is performed at the polysilicon channel of the GIDL generation transistors. In some cases, the GIDL generation transistor with the shallowest phosphorous diffusion is the GIDL generation transistor that generates the charge carriers during erase. However, in some embodiments charge carriers can be generated by GIDL at multiple GIDL generation transistors at a particular side of the NAND string.
  • Memory holes/Vertical columns 472 and 474 are depicted protruding through the drain side select layers, source side select layers, dummy word line layers, GIDL generation transistor layers and word line layers. In one embodiment, each memory hole/vertical column comprises a vertical NAND string. Below the memory holes/vertical columns and the layers listed below is substrate 453, an insulating film 454 on the substrate, and source line SL. The NAND string of memory hole/vertical column 472 has a source end at a bottom of the stack and a drain end at a top of the stack. As in agreement with FIG. 4B, FIG. 4C show vertical memory hole/column 472 connected to bit line 414 via connector 417.
  • For ease of reference, drain side select layers; source side select layers, dummy word line layers, GIDL generation transistor layers and data word line layers collectively are referred to as the conductive layers. In one embodiment, the conductive layers are made from a combination of TiN and Tungsten. In other embodiments, other materials can be used to form the conductive layers, such as doped polysilicon, metal such as Tungsten, metal silicide, such as nickel silicide, tungsten silicide, aluminum silicide or the combination thereof. In some embodiments, different conductive layers can be formed from different materials. Between conductive layers are dielectric layers DL. In one embodiment, the dielectric layers are made from SiO2. In other embodiments, other dielectric materials can be used to form the dielectric layers.
  • The non-volatile memory cells are formed along memory holes/vertical columns which extend through alternating conductive and dielectric layers in the stack. In one embodiment, the memory cells are arranged in NAND strings. The word line layers WL0-W161 connect to memory cells (also called data memory cells). Dummy word line layers connect to dummy memory cells. A dummy memory cell does not store and is not eligible to store host data (data provided from the host, such as data from a user of the host), while a data memory cell is eligible to store host data. In some embodiments, data memory cells and dummy memory cells may have a same structure. Drain side select layers SGD0 and SGD1 are used to electrically connect and disconnect NAND strings from bit lines. Source side select layers SGS0 and SGS1 are used to electrically connect and disconnect NAND strings from the source line SL.
  • FIG. 4C shows that the memory array is implemented as a two tier architecture, with the tiers separated by a Joint area. In one embodiment it is expensive and/or challenging to etch so many word line layers intermixed with dielectric layers. To case this burden, one embodiment includes laying down a first stack of word line layers (e.g., WL0-WL80) alternating with dielectric layers, laying down the Joint area, and laying down a second stack of word line layers (e.g., WL81-WL161) alternating with dielectric layers. The Joint area are positioned between the first stack and the second stack. In one embodiment, the Joint areas are made from the same materials as the word line layers. In other embodiments, there can no Joint area or there can be multiple Joint areas.
  • FIG. 4D depicts a portion of one embodiment of a three dimensional memory structure 202 showing a cross-sectional view along line BB of FIG. 4B. This cross sectional view cuts through memory holes/vertical columns (NAND strings) 432 and 434 of region 430 (see FIG. 4B). FIG. 4D shows the same alternating conductive and dielectric layers as FIG. 4C. FIG. 4D also shows isolation region 482. Isolation regions 482, 484, 486 and 488) occupy space that would have been used for a portion of the memory holes/vertical columns/NAND stings. For example, isolation region 482 occupies space that would have been used for a portion of memory hole/vertical column 434. More specifically, a portion (e.g., half the diameter) of vertical column 434 has been removed in layers SGDT0, SGDT1, SGD0, and SGD1 to accommodate isolation region 482. Thus, while most of the vertical column 434 is cylindrical (with a circular cross section), the portion of vertical column 434 in layers SGDT0, SGDT1, SGD0, and SGD1 has a semi-circular cross section. In one embodiment, after the stack of alternating conductive and dielectric layers is formed, the stack is etched to create space for the isolation region and that space is then filled in with SiO2. This structure allows for separate control of SGDT0, SGDT1, SGD0, and SGD1 for regions 430, 440, 450, 460, and 470.
  • FIG. 4E depicts a cross sectional view of region 429 of FIG. 4C that includes a portion of memory hole/vertical column 472. In one embodiment, the memory holes/vertical columns are round; however, in other embodiments other shapes can be used. In one embodiment, memory hole/vertical column 472 includes an inner core layer 490 that is made of a dielectric, such as SiO2. Other materials can also be used. Surrounding inner core 490 is polysilicon channel 491. Materials other than polysilicon can also be used. Note that it is the channel 491 that connects to the bit line and the source line. Surrounding channel 491 is a tunneling dielectric 492. In one embodiment, tunneling dielectric 492 has an ONO structure. Surrounding tunneling dielectric 492 is charge trapping layer 493, such as (for example) Silicon Nitride. Other memory materials and structures can also be used. The technology described herein is not limited to any particular material or structure.
  • FIG. 4E depicts dielectric layers DL as well as word line layers WL160, WL159, WL158, WL157, and WL156. Each of the word line layers includes a word line region 496 surrounded by an aluminum oxide layer 497, which is surrounded by a blocking oxide layer 498. In other embodiments, the blocking oxide layer can be a vertical layer parallel and adjacent to charge trapping layer 493. The physical interaction of the word line layers with the vertical column forms the memory cells. Thus, a memory cell, in one embodiment, comprises channel 491, tunneling dielectric 492, charge trapping layer 493, blocking oxide layer 498, aluminum oxide layer 497 and word line region 496. For example, word line layer WL160 and a portion of memory hole/vertical column 472 comprise a memory cell MC1. Word line layer WL159 and a portion of memory hole/vertical column 472 comprise a memory cell MC2. Word line layer WL158 and a portion of memory hole/vertical column 472 comprise a memory cell MC3. Word line layer WL157 and a portion of memory hole/vertical column 472 comprise a memory cell MC4. Word line layer WL156 and a portion of memory hole/vertical column 472 comprise a memory cell MC5. In other architectures, a memory cell may have a different structure; however, the memory cell would still be the storage unit.
  • When a memory cell is programmed, electrons are stored in a portion of the charge trapping layer 493 which is associated with (e.g. in) the memory cell. These electrons are drawn into the charge trapping layer 493 from the channel 491, through the tunneling dielectric 492, in response to an appropriate voltage on word line region 496. The threshold voltage (Vth) of a memory cell is increased in proportion to the amount of stored charge. In one embodiment, the programming is achieved through Fowler-Nordheim tunneling of the electrons into the charge trapping layer. During an erase operation, the electrons return to the channel or holes are injected into the charge trapping layer to recombine with electrons. In one embodiment, erasing is achieved using hole injection into the charge trapping layer via a physical mechanism such as GIDL.
  • FIG. 4F is a schematic diagram of a portion of the three dimensional memory array 202 depicted in in FIGS. 4-4E. FIG. 4F shows physical data word lines WL0-WL161 running across the entire block. The structure of FIG. 4F corresponds to a portion 406 in Block 2 of FIG. 4A, including bit line 411. Within the block, in one embodiment, each bit line is connected to five NAND strings, one in each region of regions 430, 440, 450, 460, 470. Thus, FIG. 4F shows bit line 411 connected to NAND string NS0 (which corresponds to memory hole/vertical column 436 of region 430), NAND string NS1 (which corresponds to memory hole/vertical column 446 of region 440), NAND string NS2 (which corresponds to vertical column 456 of region 450), NAND string NS3 (which corresponds to memory hole/vertical column 466 of region 460), and NAND string NS4 (which corresponds to memory hole/vertical column 476 of region 470).
  • Drain side select line/layer SGD0 is separated by isolation regions isolation regions 482, 484, 486 and 488 to form SGD0-s 0, SGD0-s 1, SGD0-s 2, SGD0-s 3 and SGD0-s 4 in order to separately connect to and independently control regions 430, 440, 450, 460, 470. Similarly, drain side select line/layer SGD1 is separated by isolation regions 482, 484, 486 and 488 to form SGD1-s 0, SGD1-s 1, SGD1-s 2, SGD1-s 3 and SGD1-s 4 in order to separately connect to and independently control regions 430, 440, 450, 460, 470; drain side GIDL generation transistor control line/layer SGDT0 is separated by isolation regions 482, 484, 486 and 488 to form SGDT0-s 0, SGDT0-s 1, SGDT0-s 2, SGDT0-s 3 and SGDT0-s 4 in order to separately connect to and independently control regions 430, 440, 450, 460, 470; drain side GIDL generation transistor control line/layer SGDT1 is separated by isolation regions 482, 484, 486 and 488 to form SGDT1-s 0, SGDT1-s 1, SGDT1-s 2, SGDT1-s 3 and SGDT1-s 4 in order to separately connect to and independently control regions 430, 440, 450, 460, 470.
  • FIG. 4F only shows NAND strings connected to bit line 411. However, a full schematic of the block would show every bit line and five vertical NAND strings (that are in separate regions) connected to each bit line.
  • Although the example memories of FIGS. 4-4F are three dimensional memory structure that includes vertical NAND strings with charge-trapping material, other (2D and 3D) memory structures can also be used with the technology described herein.
  • The memory systems discussed above can be erased, programmed and read. At the end of a successful programming process, the threshold voltages of the memory cells should be within one or more distributions of threshold voltages for programmed memory cells or within a distribution of threshold voltages for erased memory cells, as appropriate. FIG. 5A is a graph of threshold voltage versus number of memory cells, and illustrates example threshold voltage distributions for the memory array when each memory cell stores one bit of data per memory cell. Memory cells that store one bit of data per memory cell data are referred to as single level cells (“SLC”). The data stored in SLC memory cells is referred to as SLC data; therefore, SLC data comprises one bit per memory cell. Data stored as one bit per memory cell is SLC data. FIG. 5A shows two threshold voltage distributions: E and P. Threshold voltage distribution E corresponds to an erased data state. Threshold voltage distribution P corresponds to a programmed data state. Memory cells that have threshold voltages in threshold voltage distribution E are, therefore, in the erased data state (e.g., they are erased). Memory cells that have threshold voltages in threshold voltage distribution P are, therefore, in the programmed data state (e.g., they are programmed). In one embodiment, erased memory cells store data “1” and programmed memory cells store data “0.” FIG. 5A depicts read reference voltage Vr. By testing (e.g., performing one or more sense operations) whether the threshold voltage of a given memory cell is above or below Vr, the system can determine a memory cells is erased (state E) or programmed (state P). FIG. 5A also depicts verify reference voltage Vv. In some embodiments, when programming memory cells to data state P, the system will test whether those memory cells have a threshold voltage greater than or equal to Vv.
  • FIGS. 5B-D illustrate example threshold voltage distributions for the memory array when each memory cell stores multiple bit per memory cell data. Memory cells that store multiple bit per memory cell data are referred to as multi-level cells (“MLC”). The data stored in MLC memory cells is referred to as MLC data; therefore, MLC data comprises multiple bits per memory cell. Data stored as multiple bits of data per memory cell is MLC data. In the example embodiment of FIG. 5B, each memory cell stores two bits of data. Other embodiments may use other data capacities per memory cell (e.g., such as three, four, or five bits of data per memory cell).
  • FIG. 5B shows a first threshold voltage distribution E for erased memory cells. Three threshold voltage distributions A, B and C for programmed memory cells are also depicted. In one embodiment, the threshold voltages in the distribution E are negative and the threshold voltages in distributions A, B and C are positive. Each distinct threshold voltage distribution of FIG. 5B corresponds to predetermined values for the set of data bits. In one embodiment, each bit of data of the two bits of data stored in a memory cell are in different logical pages, referred to as a lower page (LP) and an upper page (UP). In other embodiments, all bits of data stored in a memory cell are in a common logical page. The specific relationship between the data programmed into the memory cell and the threshold voltage levels of the cell depends upon the data encoding scheme adopted for the cells. Table 1 provides an example encoding scheme.
  • TABLE 1
    E A B C
    LP 1 0 0 1
    UP 1 1 0 0
  • In one embodiment, known as full sequence programming, memory cells can be programmed from the erased data state E directly to any of the programmed data states A, B or C using the process of FIG. 6 (discussed below). For example, a population of memory cells to be programmed may first be erased so that all memory cells in the population are in erased data state E. Then, a programming process is used to program memory cells directly into data states A, B, and/or C. For example, while some memory cells are being programmed from data state E to data state A, other memory cells are being programmed from data state E to data state B and/or from data state E to data state C. The arrows of FIG. 5B represent the full sequence programming. In some embodiments, data states A-C can overlap, with memory controller 120 (or control die 211) relying on error correction to identify the correct data being stored.
  • FIG. 5C depicts example threshold voltage distributions for memory cells where each memory cell stores three bits of data per memory cells (which is another example of MLC data). FIG. 5C shows eight threshold voltage distributions, corresponding to eight data states. The first threshold voltage distribution (data state) Er represents memory cells that are erased. The other seven threshold voltage distributions (data states) A-G represent memory cells that are programmed and, therefore, are also called programmed states. Each threshold voltage distribution (data state) corresponds to predetermined values for the set of data bits. The specific relationship between the data programmed into the memory cell and the threshold voltage levels of the cell depends upon the data encoding scheme adopted for the cells. In one embodiment, data values are assigned to the threshold voltage ranges using a Gray code assignment so that if the threshold voltage of a memory erroneously shifts to its neighboring physical state, only one bit will be affected. Table 2 provides an example of an encoding scheme for embodiments in which each bit of data of the three bits of data stored in a memory cell are in different logical pages, referred to as a lower page (LP), middle page (MP) and an upper page (UP).
  • TABLE 2
    Er A B C D E F G
    UP 1 1 1 0 0 0 0 1
    MP 1 1 0 0 1 1 0 0
    LP 1 0 0 0 0 1 1 1
  • FIG. 5C shows seven read reference voltages, VrA, VrB, VIC, VrD, VrE, VrF, and VrG eat.veggiesfor reading data from memory cells. By testing (e.g., performing sense operations) whether the threshold voltage of a given memory cell is above or below the seven read reference voltages, the system can determine what data state (i.e., A, B, C, D, . . . ) a memory cell is in.
  • FIG. 5C also shows seven verify reference voltages, VvA, VvB, VvC, VvD, VVE, VvF, and VvG. In some embodiments, when programming memory cells to data state A, the system will test whether those memory cells have a threshold voltage greater than or equal to VvA. When programming memory cells to data state B, the system will test whether the memory cells have threshold voltages greater than or equal to VvB. When programming memory cells to data state C, the system will determine whether memory cells have their threshold voltage greater than or equal to VvC. When programming memory cells to data state D, the system will test whether those memory cells have a threshold voltage greater than or equal to VvD. When programming memory cells to data state E, the system will test whether those memory cells have a threshold voltage greater than or equal to VvE. When programming memory cells to data state F, the system will test whether those memory cells have a threshold voltage greater than or equal to VvF. When programming memory cells to data state G, the system will test whether those memory cells have a threshold voltage greater than or equal to VvG. FIG. 5C also shows Vev, which is an erase verify reference voltage to test whether a memory cell has been properly erased.
  • In an embodiment that utilizes full sequence programming, memory cells can be programmed from the erased data state Er directly to any of the programmed data states A-G using the process of FIG. 6 (discussed below). For example, a population of memory cells to be programmed may first be erased so that all memory cells in the population are in erased data state Er. Then, a programming process is used to program memory cells directly into data states A, B, C, D, E, F, and/or G. For example, while some memory cells are being programmed from data state Er to data state A, other memory cells are being programmed from data state Er to data state B and/or from data state Er to data state C, and so on. The arrows of FIG. 5C represent the full sequence programming. In some embodiments, data states A-G can overlap, with control die 211 and/or memory controller 120 relying on error correction to identify the correct data being stored. Note that in some embodiments, rather than using full sequence programming, the system can use multi-pass programming processes known in the art.
  • In general, during verify operations and read operations, the selected word line is connected to a voltage (one example of a reference signal), a level of which is specified for each read operation (e.g., see read compare voltages/levels VrA, VrB, VrC, VrD, VrE, VrF, and VrG, of FIG. 5C) or verify operation (e.g. see verify target voltages/levels VvA, VvB, VvC, VvD, VvE, VvF, and VvG of FIG. 5C) in order to determine whether a threshold voltage of the concerned memory cell has reached such level. After applying the word line voltage, the conduction current of the memory cell is measured to determine whether the memory cell turned on (conducted current) in response to the voltage applied to the word line. If the conduction current is measured to be greater than a certain value, then it is assumed that the memory cell turned on and the voltage applied to the word line is greater than the threshold voltage of the memory cell. If the conduction current is not measured to be greater than the certain value, then it is assumed that the memory cell did not turn on and the voltage applied to the word line is not greater than the threshold voltage of the memory cell. During a read or verify process, the unselected memory cells are provided with one or more read pass voltages (also referred to as bypass voltages) at their control gates so that these memory cells will operate as pass gates (e.g., conducting current regardless of whether they are programmed or erased).
  • There are many ways to measure the conduction current of a memory cell during a read or verify operation. In one example, the conduction current of a memory cell is measured by the rate it discharges or charges a dedicated capacitor in the sense amplifier. In another example, the conduction current of the selected memory cell allows (or fails to allow) the NAND string that includes the memory cell to discharge a corresponding bit line. The voltage on the bit line is measured after a period of time to see whether it has been discharged or not. Note that the technology described herein can be used with different methods known in the art for verifying/reading. Other read and verify techniques known in the art can also be used.
  • FIG. 5C shows no overlap between threshold voltage distributions. FIG. 5D depicts an embodiment where each memory cell stores three bits of data per memory cells and the threshold voltage distributions overlap with one or more neighboring threshold voltage distributions. For example, the threshold voltage distribution for data state B overlaps with the threshold voltage distributions for data states A and C. The overlap may occur due to factors such as memory cells losing charge (and hence dropping in threshold voltage). Program disturb can unintentionally increase the threshold voltage of a memory cell. Likewise, read disturb can unintentionally increase the threshold voltage of a memory cell. Over time, the locations of the threshold voltage distributions may change. Such changes can increase the bit error rate, thereby increasing decoding time or even making decoding impossible. Changing the read reference voltages can help to mitigate such effects. Using ECC during the read process can fix errors and ambiguities.
  • FIG. 5E depicts threshold voltage distributions when each memory cell stores four bits of data, which is another example of MLC data. FIG. 5E depicts that there may be some overlap between the threshold voltage distributions (data states) S0-S15. The threshold voltage distributions of FIG. 5D will include read reference voltages and verify reference voltages, as discussed above. FIG. 5E shows the threshold voltage distributions overlap with one or more neighboring threshold voltage distributions; however, in some embodiments the threshold voltage distributions for a population of memory cells storing four bits of data per memory cell do not overlap and are separated from each other.
  • When using four bits per memory cell, the memory can be programmed using the full sequence programming discussed above, or multi-pass programming processes known in the art. Each threshold voltage distribution of FIG. 5E corresponds to a data state (S0-S15) and predetermined values for the set of data bits. The specific relationship between the data programmed into the memory cell and the threshold voltage levels of the memory cell depends upon the data encoding scheme adopted for the cells. Table 3 provides an example of an encoding scheme for embodiments in which each bit of data of the four bits of data stored in a memory cell are in different logical pages, referred to as a lower page (LP), middle page (MP), an upper page (UP) and top page (TP).
  • TABLE 3
    S0 S1 S2 S3 S4 S5 S6 S7 S8 S9 S10 S11 S12 S13 S14 S15
    TP 1 1 1 1 1 0 0 0 0 0 1 1 0 0 0 1
    UP 1 1 0 0 0 0 0 0 1 1 1 1 1 1 0 0
    MP 1 1 1 0 0 0 0 1 1 0 0 0 0 1 1 1
    LP 1 0 0 0 1 1 0 0 0 0 0 1 1 1 1 1
  • FIG. 6 is a flowchart describing one embodiment of a process for programming memory cells. For purposes of this document, the term program and programming are synonymous with write and writing. In one example embodiment, the process of FIG. 6 is performed for memory array 202 using the one or more control circuits (e.g., system control logic 260, column control circuitry 210, row control circuitry 220) discussed above. In one example embodiment, the process of FIG. 6 is performed by integrated memory assembly 207 using the one or more control circuits (e.g., system control logic 260, column control circuitry 210, row control circuitry 220) of control die 211 to program memory cells on memory die 201. The process includes multiple loops, each of which includes a program phase and a verify phase. The process of FIG. 6 is performed to implement the full sequence programming, as well as other programming schemes including multi-stage programming. When implementing multi-stage programming, the process of FIG. 6 is used to implement any/each stage of the multi-stage programming process.
  • Typically, the program voltage applied to the control gates (via a selected data word line) during a program operation is applied as a series of program voltage pulses. Between program voltage pulses are a set of verify pulses (e.g., voltage pulses) to perform verification. In many implementations, the magnitude of the program voltage pulses is increased with each successive pulse by a predetermined step size. In step 602 of FIG. 6 , the programming voltage signal (Vpgm) is initialized to the starting magnitude (e.g., ˜12-16V or another suitable level) and a program counter PC maintained by state machine 262 is initialized at 1. In one embodiment, the group of memory cells selected to be programmed (referred to herein as the selected memory cells) are programmed concurrently and are all connected to the same word line (the selected word line). There will likely be other memory cells that are not selected for programming (unselected memory cells) that are also connected to the selected word line. That is, the selected word line will also be connected to memory cells that are supposed to be inhibited from programming. Additionally, as memory cells reach their intended target data state, they will be inhibited from further programming. Those NAND strings (e.g., unselected NAND strings) that include memory cells connected to the selected word line that are to be inhibited from programming have their channels boosted to inhibit programming. When a channel has a boosted voltage, the voltage differential between the channel and the word line is not large enough to cause programming. To assist in the boosting, in step 604 the control die will pre-charge channels of NAND strings that include memory cells connected to the selected word line that are to be inhibited from programming. In step 606, NAND strings that include memory cells connected to the selected word line that are to be inhibited from programming have their channels boosted to inhibit programming. Such NAND strings are referred to herein as “unselected NAND strings.” In one embodiment, the unselected word lines receive one or more boosting voltages (e.g., ˜7-11 volts) to perform boosting schemes. A program inhibit voltage is applied to the bit lines coupled the unselected NAND string.
  • In step 608, a program voltage pulse of the programming voltage signal Vpgm is applied to the selected word line (the word line selected for programming). If a memory cell on a NAND string should be programmed, then the corresponding bit line is biased at a program enable voltage. In step 608, the program pulse is concurrently applied to all memory cells connected to the selected word line so that all of the memory cells connected to the selected word line are programmed concurrently (unless they are inhibited from programming). That is, they are programmed at the same time or during overlapping times (both of which are considered concurrent). In this manner all of the memory cells connected to the selected word line will concurrently have their threshold voltage change, unless they are inhibited from programming.
  • In step 610, program-verify is performed, which includes testing whether memory cells being programmed have successfully reached their target data state. Memory cells that have reached their target states are locked out from further programming by the control die. Step 610 includes performing verification of programming by sensing at one or more verify reference levels. In one embodiment, the verification process is performed by testing whether the threshold voltages of the memory cells selected for programming have reached the appropriate verify reference voltage. In step 610, a memory cell may be locked out after the memory cell has been verified (by a test of the Vt) that the memory cell has reached its target state.
  • In one embodiment of step 610, a smart verify technique is used such that the system only verifies a subset of data states during a program loop (steps 604-628). For example, the first program loop includes verifying for data state A (see FIG. 5C), depending on the result of the verify operation the second program loop may perform verify for data states A and B, depending on the result of the verify operation the third program loop may perform verify for data states B and C, and so on.
  • In step 616, the number of memory cells that have not yet reached their respective target threshold voltage distribution are counted. That is, the number of memory cells that have, so far, failed to reach their target state are counted. This counting can be done by state machine 262, memory controller 120, or another circuit. In one embodiment, there is one total count, which reflects the total number of memory cells currently being programmed that have failed the last verify step. In another embodiment, separate counts are kept for each data state.
  • In step 617, the system determines whether the verify operation in the latest performance of step 610 included verifying for the last data state (e.g., data state G of FIG. 5C). If so, then in step 618, it is determined whether the count from step 616 is less than or equal to a predetermined limit. In one embodiment, the predetermined limit is the number of bits that can be corrected by error correction codes (ECC) during a read process for the page of memory cells. If the number of failed cells is less than or equal to the predetermined limit, then the programming process can stop and a status of “PASS” is reported in step 614. In this situation, enough memory cells programmed correctly such that the few remaining memory cells that have not been completely programmed can be corrected using ECC during the read process. In some embodiments, the predetermined limit used in step 618 is below the number of bits that can be corrected by error correction codes (ECC) during a read process to allow for future/additional errors. When programming less than all of the memory cells for a page, the predetermined limit can be a portion (pro-rata or not pro-rata) of the number of bits that can be corrected by ECC during a read process for the page of memory cells. In some embodiments, the limit is not predetermined. Instead, it changes based on the number of errors already counted for the page, the number of program-erase cycles performed or other criteria.
  • If in step 617 it was determined that the verify operation in the latest performance of step 610 did not include verifying for the last data state or in step 618 it was determined that the number of failed memory cells is not less than the predetermined limit, then in step 619 the data states that will be verified in the next performance of step 610 (in the next program loop) is adjusted as per the smart verify scheme discussed above. In step 620, the program counter PC is checked against the program limit value (PL). Examples of program limit values include 6, 12, 16, 19, 20 and 30; however, other values can be used. If the program counter PC is not less than the program limit value PL, then the program process is considered to have failed and a status of FAIL is reported in step 624. If the program counter PC is less than the program limit value PL, then the process continues at step 626 during which time the Program Counter PC is incremented by 1 and the programming voltage signal Vpgm is stepped up to the next magnitude. For example, the next pulse will have a magnitude greater than the previous pulse by a step size ΔVpgm (e.g., a step size of 0.1-1.0 volts). After step 626, the process continues at step 604 and another program pulse is applied to the selected word line (by the control die) so that another program loop (steps 604-626) of the programming process of FIG. 6 is performed.
  • In one embodiment memory cells are erased prior to programming. Erasing is the process of changing the threshold voltage of one or more memory cells from a programmed data state to an erased data state. For example, changing the threshold voltage of one or more memory cells from state P to state E of FIG. 5A, from states A/B/C to state E of FIG. 5B, from states A-G to state Er of FIG. 5C or from states S1-S15 to state S0 of FIG. 5D. In one embodiment, the control circuit is configured to program memory cells in the direction from the erased data state toward the highest data state (e.g., from data state Er to data state G) and erase memory cells in the direction from the highest data state toward the erased data state (e.g., from data state G to data state Er).
  • One technique to erase memory cells in some memory devices is to bias a p-well (or other types of) substrate to a high voltage to charge up a NAND channel. An erase enable voltage (e.g., a low voltage) is applied to control gates of memory cells while the NAND channel is at a high voltage to erase the memory cells. Herein, this is referred to as p-well erase.
  • Another approach to erasing memory cells is to generate gate induced drain leakage (“GIDL”) current to charge up the NAND string channel. An erase enable voltage is applied to control gates of the memory cells, while maintaining the NAND string channel potential to erase the memory cells. Herein, this is referred to as GIDL erase. Both p-well erase and GIDL erase may be used to lower the threshold voltage (Vt) of memory cells.
  • In one embodiment, the GIDL current is generated by causing a drain-to-gate voltage at a GIDL generation transistor (e.g., transistors connected to SGDT0, SGDT1, SGSB0, and SGSB1). In some embodiments, a select gate (e.g., SGD or SGS) can be used as a GIDL generation transistor. A transistor drain-to-gate voltage that generates a GIDL current is referred to herein as a GIDL voltage. The GIDL current may result when the GIDL generation transistor drain voltage is significantly higher than the GIDL generation transistor control gate voltage. GIDL current is a result of carrier generation, i.e., electron-hole pair generation due to band-to-band tunneling and/or trap-assisted generation. In one embodiment, GIDL current may result in one type of carriers (also referred to a charge carriers), e.g., holes, predominantly moving into the NAND channel, thereby raising or changing the potential of the channel. The other type of carriers, e.g., electrons, are extracted from the channel, in the direction of a bit line or in the direction of a source line by an electric field. During erase, the holes may tunnel from the channel to a charge storage region of the memory cells (e.g., to charge trapping layer 493) and recombine with electrons there, to lower the threshold voltage of the memory cells.
  • The GIDL current may be generated at either end (or both ends) of the NAND string. A first GIDL voltage may be created between two terminals of a GIDL generation transistor (e.g., connected to SGDT0, SGDT1) that is connected to or near a bit line to generate a first GIDL current. A second GIDL voltage may be created between two terminals of a GIDL generation transistor (e.g., SGSB0, SGSB1) that is connected to or near a source line to generate a second GIDL current. Erasing based on GIDL current at only one end of the NAND string is referred to as a one-sided GIDL erase. Erasing based on GIDL current at both ends of the NAND string is referred to as a two-sided GIDL erase. The technology described herein can be used with one-sided GIDL erase and two-sided GIDL erase.
  • FIG. 7 is a timing diagram depicting the behavior of various signals when sensing data during a read operation or a program verify operation. FIG. 7 depicts the following signals: BL(sel), BL(unsel), SGD(sel), SGD(unsel), WLunsel, WLx, DU/DL, SGS and SL. The signal BL(sel) is the voltage applied to bit lines connected to NAND strings having memory cells selected for reading. The signal BL(unsel) is the voltage applied to bit lines connected to NAND strings that do not have any memory cells selected for reading. The signal SGD(sel) is the voltage applied to the drain side select (SGD) lines (e.g., SGD0 and SGD1 connected together for one region) for the region (e.g., regions 430, 440, 450, 460 and 470) selected for programming. The signal SGD(unsel) is the voltage applied to the drain side select (SGD) lines (e.g., SGD0 and SGD1 connected together for one region) for the regions (e.g., regions 430, 440, 450, 460 and 470) not selected for programming. The signal WLx is the voltage applied to the word line selected for reading/verifying. The signal WLunsel is the voltage applied to the word lines not selected for reading. DU/DL is the signal applied to the dummy word lines DU and DL, which are adjacent to the Joint area. SGS is the source side select lines (e.g., SGS0 and SGS1 connected together for one region). SL is the source line.
  • At time t0 of FIG. 7 , all signals depicted in FIG. 7 are at Vss (ground or 0 volts). At time t1, SGD(sel), WLunsel, WLx and DU/DL are raised to Vdd (e.g., ˜3 volts) as part of a step process of ramping up to target voltages. At time t2, BL(sel) is raised to Vb1 (e.g., 0.5-1.5v). Also at time t2, DU/DL, WLx and WLunsel are raised from Vdd to Vread (e.g., 6-8 volts). Vread is an example of an overdrive voltage because it is high enough to turn on the memory cell regardless of which data state the memory cell has been programmed to. Vpass (used during programming) is another example of an overdrive voltage. Other overdrive voltages can also be used. Also at time t2, SGD(sel) is raised from Vdd to Vsg (e.g., 3.5-6v), an example of a sense enabling voltage. At t3, WLx is lowered back to ground. WLx is subsequently raised to Vegr (e.g., one of the read reference voltages VrA, VrB, VIC, VrD, VrE, VrF, and VrG of FIG. 5C) between t3 and t4 . . . . If the system is performing a verify operation than Vegr is one of the verify reference voltages (e.g., VvA, VvB, VvC, VvD, VvE, VvF, and VvG of FIG. 5C) applied to WLx. When performing erase verify, Vev (see FIG. 5C) can be applied. At time t4, SGS is raised to Vsg, which provides a path for the bit line voltage to dissipate. If Vegr is greater than the threshold voltage of the selected memory cells, then the selected memory cells will conduct current and the bit line voltage will dissipate via the source line, as depicted by curve 794. If Vegr is not greater than the threshold voltage of the selected memory cells, then the selected memory cells will not conduct current and the bit line voltage will not dissipate via the source line, as depicted by curve 792. The sense amplifiers will sense whether the selected memory cell conducted or not at time t5. At time t6, BL(sel) is lowered to Vss. At time t7, SGD(sel), WLunsel, WLx, and SGS are lowered to Vss. When sensing at t5, the results of the sensing are stored in a latch at the respective sense amplifier. Afterwards, the system (e.g., control circuit) scans all of the latches of the sense amplifiers to determine which memory cells conducted and which did not conduct.
  • Memory systems often use Error Correction Codes (ECC) to protect data from corruption. Many ECC coding schemes are well known in the art. These conventional error correction codes are useful in large scale memories, including flash (and other non-volatile) memories, because of the substantial impact on manufacturing yield and device reliability that such coding schemes can provide, rendering devices that have a few non-programmable or defective cells as useable. Of course, a tradeoff exists between the yield savings and the cost of providing additional memory cells to store the code bits. As such, some ECC codes are better suited for flash memory devices than others. Generally, ECC codes for flash memory devices tend to have higher code rates (i.e., a lower ratio of code bits to data bits) than the codes used in data communications applications (which may have code rates as low as ½). Examples of well-known ECC codes commonly used in connection with flash memory storage include Reed-Solomon codes, other BCH codes, Hamming codes, and the like. Sometimes, the error correction codes used in connection with flash memory storage are “systematic,” in that the data portion of the eventual code word is unchanged from the actual data being encoded, with the code or parity bits appended to the data bits to form the complete code word.
  • The particular read parameters for a given error correction code include the type of code, the size of the block of actual data from which the code word is derived, and the overall length of the code word after encoding. For example, a typical BCH code applied to a sector of 512 bytes (4096 bits) of data can correct up to four error bits, if at least 60 ECC or parity bits are used. Reed-Solomon codes are a subset of BCH codes, and are also commonly used for error correction. For example, a typical Reed-Solomon code can correct up to four errors in a 512 byte sector of data, using about 72 ECC bits. In the flash memory context, error correction coding provides substantial improvement in manufacturing yield, as well as in the reliability of the flash memory over time.
  • In some embodiments, Memory Controller 120 receives host data, also referred to as information bits, that is to be stored in memory cells of non-volatile three dimensional memory structure 202. The informational bits are represented by the matrix i=[1 0] (note that two bits are used for example purposes only, and many embodiments have code words longer than two bits). An error correction coding process (such as any of the processes mentioned above or below) is implemented in which parity bits are added to the informational bits to provide data represented by the matrix or code word v=[1 0 1 0], indicating that two parity bits have been appended to the data bits. Other techniques can be used that map input data to output data in more complex manners. For example, low density parity check (LDPC) codes, also referred to as Gallager codes, can be used. More details about LDPC codes can be found in R. G. Gallager, “Low-density parity-check codes,” IRE Trans. Inform. Theory, vol. IT-8, pp. 21 28, January 1962; and D. MacKay, Information Theory, Inference and Learning Algorithms, Cambridge University Press 2003, chapter 47. In practice, such LDPC codes are typically applied to multiple pages encoded across a number of storage elements, but they do not need to be applied across multiple pages. The data bits can be mapped to a logical page and stored in non-volatile three dimensional memory structure 202 by programming one or more memory cells to one or more data states, which corresponds to v.
  • When reading data that has been encoded by error correction codes, the code words v read from the memory cells using the process of FIG. 7 need to be decoded back to the original data i. In one possible implementation, an iterative probabilistic decoding process is used which implements error correction decoding corresponding to the encoding implemented in Memory Controller 120 (or on control die 211). Further details regarding iterative probabilistic decoding can be found in the above-mentioned D. MacKay text. The iterative probabilistic decoding attempts to decode a code word read from the memory by assigning initial probability metrics to each bit in the code word. The probability metrics indicate a reliability of each bit, that is, how likely it is that the bit is not in error. In one approach, the probability metrics are logarithmic likelihood ratios (LLRs) which are obtained from LLR tables. LLR values are measures of the reliability with which the values of various binary bits read from the storage elements are known.
  • The LLR for a bit is given by
  • Q = log 2 P ( v = 0 | Y ) P ( v = 1 | Y ) ,
  • where P (v=0|Y) is the probability that a bit is a 0 given the condition that the state read is Y, and P (v=1|Y) is the probability that a bit is a 1 given the condition that the state read is Y. Thus, an LLR>0 indicates a bit is more likely a 0 than a 1, while an LLR<0 indicates a bit is more likely a 1 than a 0, to meet one or more parity checks of the error correction code. Further, a greater magnitude indicates a greater probability or reliability. Thus, a bit with an LLR=63 is more likely to be a 0 than a bit with an LLR=5, and a bit with an LLR=−63 is more likely to be a 1 than a bit with an LLR=−5. LLR=0 indicates the bit is equally likely to be a 0 or a 1.
  • An LLR value can be provided for each of the bit positions in a code word. Further, the LLR tables can account for the multiple read results so that an LLR of greater magnitude is used when the bit value is consistent in the different code words.
  • Memory Controller 120 (and/or control die 211) receives the code word Y and the LLRs and iterates in successive iterations in which it determines if parity checks of the error encoding process have been satisfied. If all parity checks have been satisfied, the decoding process has converged and the code word has been successfully error corrected. If one or more parity checks have not been satisfied, the decoder will adjust the LLRs of one or more of the bits which are inconsistent with a parity check and then reapply the parity check or next check in the process to determine if it has been satisfied. For example, the magnitude and/or polarity of the LLRs can be adjusted. If the parity check in question is still not satisfied, the LLR can be adjusted again in another iteration. Adjusting the LLRs can result in flipping a bit (e.g., from 0 to 1 or from 1 to 0) in some, but not all, cases. The flipping of bits can be thought of as correcting a bit or correcting an error in the data sensed from the memory cells. In one embodiment, another parity check is applied to the code word, if applicable, once the parity check in question has been satisfied. In others, the process moves to the next parity check, looping back to the failed check at a later time. The process continues in an attempt to satisfy all parity checks. Thus, the decoding process of Y is completed to obtain the decoded information including parity bits v and the decoded information bits i.
  • It is hoped that the above-described decoding process results in all parity checks being satisfied, meaning that the decoding process converged on error free data, which is then returned to the host. However, it is possible that the code words sensed from the memory cells have too many errors for the ECC process to correct. In that case, the data is deemed uncorrectable and an error message (without the data) is returned to the host indicating that the read process has failed and was unsuccessful.
  • FIG. 8 is a flow chart describing on embodiment of a process for reading data that is able to recover data when the standard read process has failed because the code words sensed from the memory cells have too many errors for the ECC process to correct. In some example implementations, the process of FIG. 8 can be performed by any one of the one or more control circuits discussed above. The process of FIG. 8 can be performed entirely by a control circuit on memory die 200 (see FIG. 2A) or entirely by a control circuit on integrated memory assembly 207 (see FIG. 2B), rather than by memory controller 120. In one example, the process of FIG. 8 is performed by or at the direction of state machine 262, using other components of System Control Logic 260, Column Control Circuitry 210 and Row Control Circuitry 220. In another embodiment, the process of FIG. 8 is performed by memory controller 120 in combination with System Control Logic 260, Column Control Circuitry 210 and Row Control Circuitry 220. In some embodiments, the process of FIG. 8 is performed on any of the non-volatile memories discussed above.
  • In step 802 of FIG. 8 , the control circuit reads a data set from a plurality of non-volatile memory cells in overlapping threshold voltages distributions. For example, the process of FIG. 7 will be performed one or more times to sense information from memory cells in the threshold voltage distributions of FIG. 5D for one or more code words and the system attempts to decode the one or more code words (e.g., using ECC Engine 158). In step 804, the control circuit determines that the data set was not read successfully (e.g., because the code words sensed from the memory cells have too many errors for the ECC process to correct). In step 806, the control circuit, in response to determining that the data set was not read successfully, identifies memory cells in upper tails and lower tails of overlapping threshold voltages distributions. In one embodiment, the control circuit identifies memory cells that are storing error bits from the code words having too many errors and that are in upper tails or lower tails of overlapping threshold voltages distributions. In step 808, the control circuit adjusts threshold voltages of the identified memory cells (identified in step 806) to be closer to centers of the overlapping threshold voltages distributions without changing threshold voltages distributions for the identified memory cells being adjusted. More details of steps 806 and 808 will be discussed below.
  • FIG. 9 is a flow chart describing on embodiment of a process for reading data that is able to recover data when the standard read process has failed because the code words sensed from the memory cells have too many errors for the ECC process to correct. The process of FIG. 9 is an example implementation of the process for FIG. 8 . In some example implementations, the process of FIG. 9 can be performed by any one of the one or more control circuits discussed above. The process of FIG. 9 can be performed entirely by a control circuit on memory die 200 (see FIG. 2A) or entirely by a control circuit on integrated memory assembly 207 (see FIG. 2B), rather than by memory controller 120. In one example, the process of FIG. 9 is performed by or at the direction of state machine 262, using other components of System Control Logic 260, Column Control Circuitry 210 and Row Control Circuitry 220. In another embodiment, the process of FIG. 9 is performed by memory controller 120 in combination with System Control Logic 260, Column Control Circuitry 210 and Row Control Circuitry 220. In some embodiments, the process of FIG. 9 is performed on any of the non-volatile memories discussed above.
  • In step 902 of FIG. 9 , the control circuit reads a set of the data (e.g., a page of data) from addressed non-volatile memory cells of non-volatile memory array 202. In one embodiment, step 902 includes sensing the memory cells at the read reference voltages (e.g., VrA, VrB, VrC, VrD, VrE, VrF and VrG of FIGS. 5 C/D) and attempting to decode the sensed information (as discussed above with respect to the ECC process) to obtain the data stored. If (step 904) the read process was successful (e.g., the decoding was successful), then the data read is reported and a status=success is returned in step 924.
  • If (step 904) the read process was not successful (e.g., because the attempted decoding was not successful), then the process continues at step 906 and the control circuit updates the read reference voltages (e.g., VrA, VrB, VrC, VrD, VrE, VrF and VrG of FIGS. 5 C/D) based on the current overlapping threshold voltages distributions of the memory cells read. Techniques are known in the art for finding the threshold voltage distributions across a set of non-volatile memory cells that incorporate the threshold voltage distribution information into calculations that may change the read reference voltages used to read the memory cells, while ensuring adequate separation in read reference voltages between different data states at which the memory cells may be read. That is, based on the current condition of the threshold voltage distributions, new or updated read reference voltages are determined in order to better read the data being stored with less errors. Examples of such techniques can be found in the following three patents, incorporated by reference herein in their entirety: U.S. Pat. Nos. 7,957,187; 9,036,427; and 9,076,545. Often updating the read reference voltages results in less errors during the read process. Thus, in step 908, the control circuit makes another attempt to read the set of the data (e.g., a page of data) from the addressed non-volatile memory cells of non-volatile memory array 202, this time using the updated read reference voltages. In one embodiment, step 908 includes sensing the memory cells at the updated read reference voltages and attempting to decode the sensed information (as discussed above with respect to the ECC process) to obtain the data stored. If (step 910) the read process was successful (e.g., the decoding was successful), then the data read is reported and a status=success is returned in step 924.
  • If (step 910) the read process was not successful (e.g., the decoding was unsuccessful), then in steps 912-918 the control circuit identifies memory cells in upper tails and lower tails of the overlapping threshold voltages distributions and performs one or more correction operations on only the identified memory cells to adjust threshold voltages of the identified memory cells to be closer to centers of the overlapping threshold voltages distributions without changing threshold voltages distributions for the identified memory cells. Steps 912-918 of FIG. 9 correspond to steps 806-808 of FIG. 8 . In step 912, the control circuit identifies memory cells in the upper tails of the threshold voltage distributions for the data states by identifying memory cells storing error bits for the data set and determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the upper tails. The memory cells storing error bits are the memory cells storing data bits that are identified as errors by the ECC process. More details of step 912 are described below with respect to FIGS. 10A, 11A, 12A and 13A. In step 914, the control circuit lowers threshold voltages of the identified memory cells (identified in step 912) to be at lower threshold voltages within the threshold voltage distribution for the respective data state without lowering the threshold voltages of the identified memory cells to be lower than the threshold voltage distribution for the respective data state, and without concurrently lowering or raising the threshold voltages of other memory cells. More details of step 914 are provided below with respect to FIGS. 10A-14 . In step 916, the control circuit identifies memory cells in the lower tails of the threshold voltage distributions for the data states by identifying memory cells storing error bits for the data set and determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the lower tails. More details of step 916 are described below with respect to FIGS. 10A, 11A, 12A and 13A. In step 918, the control circuit raises threshold voltages of the identified memory cells (identified in step 916) to be at higher threshold voltages within the threshold voltage distribution for the respective data state without lowering the threshold voltages of the identified memory cells to be lower than the threshold voltage distribution for the respective data state, and without concurrently lowering or raising the threshold voltages of other memory cells. More details of step 918 are provided below with respect to FIGS. 10A-13B and 15 . In one embodiment, steps 914 and 918 comprise performing correction operations on only the memory cells identified in steps 912 and 916, and after these correction operations the control circuit is configured to persistently maintain the identified memory cells in the respective data states.
  • The lowering of threshold voltages for some memory cells in step 914 and the raising of threshold voltages of some memory cells in step 918 should reduce the number of errors in the data stored and, thereby, reduce the number of errors in the read process for that data. Thus, in step 920, the control circuit makes another attempt to read the set of the data (e.g., a page of data) from the addressed non-volatile memory cells of non-volatile memory array 202 (still using the updated read reference voltages). In one embodiment, step 920 includes sensing the memory cells at the updated read reference voltages and attempting to decode the sensed information (as discussed above with respect to the ECC process) to obtain the data stored. If (step 922) the read process was successful (e.g., the decoding was successful), then the data read is reported and a status=success is returned in step 924.
  • If (step 922) the read process was not successful (e.g., the decoding was unsuccessful), then the process loops back to step 912 so that steps 912-918 can be performed again to further reduce the number of errors. In one embodiment, the control circuit will keep repeating steps 912-918 (e.g., to lower threshold voltages of some memory cells and raise threshold voltages of some memory cells) until the number of errors is sufficiently reduced so that the read process (step 920) is successful.
  • FIGS. 10A and 10B depict a set of overlapping threshold voltage distributions for the set of data states Er-G depicted in FIG. 5D. However, the teaching of FIGS. 10A and 10B (which explain steps 912-918) can apply to other sets of data states including systems that use more than or less than three bits of data per memory cell. FIG. 10A depicts the set of overlapping threshold voltage distributions for the set of data states Er-G depicted in FIG. 5D after performing step 902 of FIG. 9 (and/or after performing step 908 of FIG. 9 ) and prior to performing step 912 of FIG. 9 . FIG. 10B depicts the set of overlapping threshold voltage distributions for the set of data states Er-G depicted in FIG. 5D after performing step 918 of FIG. 9 .
  • Step 912 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the upper tails. The error bits are identified in step 902 and/or step 908 by the ECC process. FIG. 10A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the regions (upper tails) 1032, 1034, 1036, 1038, 1040, 1042 and 1044. Region 1032 is the upper tail for the threshold voltage distribution for data state Er (the erased state). Region 1034 is the upper tail for the threshold voltage distribution for data state A. Region 1036 is the upper tail for the threshold voltage distribution for data state B. Region 1038 is the upper tail for the threshold voltage distribution for data state C. Region 1040 is the upper tail for the threshold voltage distribution for data state D. Region 1042 is the upper tail for the threshold voltage distribution for data state E. Region 1044 is the upper tail for the threshold voltage distribution for data state F. In one embodiment, step 912 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1032, 1034, 1036, 1038, 1040, 1042 and 1044.
  • Step 916 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the lower tails. FIG. 10A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in regions (lower tails) 1002, 1004, 1006, 1008, 1010, 1012 and 1014. Region 1002 is the lower tail for the threshold voltage distribution for data state A. Region 1004 is the lower tail for the threshold voltage distribution for data state B. Region 1006 is the lower tail for the threshold voltage distribution for data state C. Region 1008 is the lower tail for the threshold voltage distribution for data state D. Region 1010 is the lower tail for the threshold voltage distribution for data state E. Region 1012 is the lower tail for the threshold voltage distribution for data state F. Region 1014 is the lower tail for the threshold voltage distribution for data state G. In one embodiment, step 916 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1002, 1004, 1006, 1008, 1010, 1012 and 1014.
  • FIG. 10B depicts the threshold voltage distributions after lowering threshold voltages of memory cells in upper tails (step 914) and raising threshold voltages in lower tails (step 918). Regions (lower tails) 1002, 1004, 1006, 1008, 1010, 1012 and 1014 have become narrower due to the raising of threshold voltages in step 918 and, therefore, are labelled as 1002′, 1004′, 1006′, 1008′, 1010′, 1012′ and 1014′, respectively. Regions (upper tails) 1032, 1034, 1036, 1038, 1040, 1042 and 1044 have become narrower due to the lowering of threshold voltages in step 914 and, therefore, are labelled as 1032′, 1034′, 1036′, 1038′, 1040′, 1042′ and 1044′, respectively. The narrowing of regions 1002′, 1004′, 1006′, 1008′, 1010′, 1012′, 1014′, 1032′, 1034′, 1036′, 1038′, 1040′, 1042′ and 1044′ indicates a reduction in the number of error bits.
  • As can be seen from FIGS. 10A and 10B, lowering of threshold voltages in step 914 and raising of threshold voltages in step 918 adjust the threshold voltages of the memory cells to be closer to centers of the overlapping threshold voltages distributions without changing threshold voltages distributions for the identified memory cells. The centers of the overlapping threshold voltages distributions are the tops of the curve for each threshold voltages distributions. For example, the center of the threshold voltages distribution for data state G is labeled with as voltage VGC and raising threshold voltages of memory cells in region 1014 causes some or all of those memory cells to increase in threshold voltage so that they are closer to voltage VGC than they were before the raising of threshold voltages of step 918.
  • Note that, in one embodiment, when the memory cells in the upper tails have their threshold voltage lowered, they are not lowered to be outside of the respective threshold voltage distribution and they are not increased (just lowered); for example, they are not first erased to Er and then programmed to the center of their respective threshold voltage distribution. Similarly, in one embodiment, when the memory cells in the lower tails have their threshold voltage raised, they are not raised to be outside of the respective threshold voltage distribution and they are not decreased (just increased); for example, they are not first erased to Er and then programmed to the center of their respective threshold voltage distribution. Additionally, in one embodiment, threshold voltages are lowered in step 914 using GIDL.
  • Table 2, set forth above, provides an example of an encoding scheme for embodiments in which each bit of data of the multiple bits of data stored in a memory cell are in different logical pages. In the embodiment of Table 2 the different logical pages are referred to as a lower page (LP), middle page (MP) and an upper page (UP).
  • FIGS. 11A and 11B depict a subset of the set of overlapping threshold voltage distributions for the set of data states Er-G depicted in FIG. 5D. The teaching of FIGS. 11A and 11B explain steps 912-918 when data is read from the lower page (e.g., which requires sensing at VrA and VrE during steps 902/908/920). FIG. 11A depicts the threshold voltage distributions after performing step 902 of FIG. 9 (and/or after performing step 908 of FIG. 9 ) and prior to performing step 912 of FIG. 9 . FIG. 11B depicts the threshold voltage distributions after performing step 918 of FIG. 9 .
  • Step 912 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the upper tails. The error bits are identified in step 902 and/or step 908 by the ECC process. FIG. 11A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the upper tails 1106 and 1108. Region 1106 is the upper tail for the threshold voltage distribution for data state Er (the erased state). Region 1108 is the upper tail for the threshold voltage distribution for data state D. In one embodiment, step 912 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1106 and 1108.
  • Step 916 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the lower tails. FIG. 11A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the lower tails 1102 and 1104. Region 1102 is the lower tail for the threshold voltage distribution for data state A. Region 1104 is the lower tail for the threshold voltage distribution for data state E. In one embodiment, step 916 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1102 and 1104.
  • FIG. 11B depicts the threshold voltage distributions after lowering threshold voltages of memory cells in upper tails (step 914) and raising threshold voltages in lower tails (step 918). Regions (lower tails) 1102 and 1104 have become narrower due to the raising of threshold voltages in step 918 and, therefore, are labelled as 1102′ and 1104′. Regions (upper tails) 1106 and 1108 have become narrower due to the lowering of threshold voltages in step 914 and, therefore, are labelled as 1106′ and 1108′. The narrowing of regions 1102′, 1104′, 1106′ and 1108′ indicates a reduction in the number of error bits.
  • FIGS. 12A and 12B depict a subset of the set of overlapping threshold voltage distributions for the set of data states Er-G depicted in FIG. 5D. The teaching of FIGS. 12A and 12B explain steps 912-918 when data is read from the middle page (e.g., which requires sensing at VrB, VrD and VrF during steps 902/908/920). FIG. 12A depicts the threshold voltage distributions after performing step 902 of FIG. 9 (and/or after performing step 908 of FIG. 9 ) and prior to performing step 912 of FIG. 9 . FIG. 12B depicts the threshold voltage distributions after performing step 918 of FIG. 9 .
  • Step 912 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the upper tails. The error bits are identified in step 902 and/or step 908 by the ECC process. FIG. 12A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the upper tails 1212, 1214 and 1216. Region 1212 is the upper tail for the threshold voltage distribution for data state A. Region 1214 is the upper tail for the threshold voltage distribution for data state C. Region 1216 is the upper tail for the threshold voltage distribution for data state E. In one embodiment, step 912 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1212, 1214 and 1216.
  • Step 916 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the lower tails. FIG. 12A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the lower tails 1202, 1204 and 1206. Region 1202 is the lower tail for the threshold voltage distribution for data state B. Region 1204 is the lower tail for the threshold voltage distribution for data state D. Region 1206 is the lower tail for the threshold voltage distribution for data state F. In one embodiment, step 916 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1202, 1204 and 1206.
  • FIG. 12B depicts the threshold voltage distributions after lowering threshold voltages of memory cells in upper tails (step 914) and raising threshold voltages in lower tails (step 918). Regions (lower tails) 1202, 1204 and 1206 have become narrower due to the raising of threshold voltages in step 918 and, therefore, are labelled as 1202′, 1204′ and 1206′. Regions (upper tails) 1212, 1214 and 1216 have become narrower due to the lowering of threshold voltages in step 914 and, therefore, are labelled as 1212′, 1214′ and 1216′. The narrowing of regions 1202′, 1204′, 1206′, 1212′, 1214′ and 1216′ indicates a reduction in the number of error bits.
  • FIGS. 13A and 13B depict a subset of the set of overlapping threshold voltage distributions for the set of data states Er-G depicted in FIG. 5D. The teaching of FIGS. 13A and 13B explain steps 912-918 when data is read from the upper page (e.g., which requires sensing at VrC and VrG during steps 902/908/920). FIG. 13A depicts the threshold voltage distributions after performing step 902 of FIG. 9 (and/or after performing step 908 of FIG. 9 ) and prior to performing step 912 of FIG. 9 . FIG. 13B depicts the threshold voltage distributions after performing step 918 of FIG. 9 .
  • Step 912 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the upper tails. The error bits are identified in step 902 and/or step 908 by the ECC process. FIG. 13A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the upper tails 1306 and 1308. Region 1306 is the upper tail for the threshold voltage distribution for data state B. Region 1308 is the upper tail for the threshold voltage distribution for data state F. In one embodiment, step 912 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1306 and 1308.
  • Step 916 of FIG. 9 includes determining which of the memory cells identified to be storing error bits for the data set have threshold voltages in the lower tails. FIG. 13A depicts the memory cells that have been identified to be storing error bits for the data set and have threshold voltages in the lower tails 1302 and 1304. Region 1302 is the lower tail for the threshold voltage distribution for data state B. Region 1304 is the lower tail for the threshold voltage distribution for data state G. In one embodiment, step 916 includes identifying the memory cells in one or more of (or all of) regions (upper tails) 1302 and 1304.
  • FIG. 13B depicts the threshold voltage distributions after lowering threshold voltages of memory cells in upper tails (step 914) and raising threshold voltages in lower tails (step 918). Regions (lower tails) 1302 and 1304 have become narrower due to the raising of threshold voltages in step 918 and, therefore, are labelled as 1302′ and 1304′. Regions (upper tails) 1306 and 1308 have become narrower due to the lowering of threshold voltages in step 914 and, therefore, are labelled as 1306′ and 1308′. The narrowing of regions 1302′, 1304′, 1306′ and 1308′ indicates a reduction in the number of error bits.
  • FIG. 14 is a bit level erase signal timing diagram that describes one example implementation of the lowering of threshold voltages of the identified memory cells as part of step 914 of FIG. 9 . FIG. 14 depicts the following signals: Sel BL, Unsel BL, Sel SGDT0/1, Unsel SGDT0/1, SGD0/1, DD0/1, WL0 to WLx−1, WLx, WLx+1 to WL161, DS0/1, SGS0/1, SGSB0/1, and SL. The signal Sel BL is the voltage applied to all of the bit lines connected to NAND strings having a memory cell identified in step 912 to be storing an error bit for the data set and have a threshold voltage in an upper tail. The signal Unsel BL is the voltage applied to all of the bit lines connected to NAND strings not having a memory cell identified in step 912 to be storing an error bit for the data set and have a threshold voltage in an upper tail. The signal Sel SGDT0/1 is the voltage applied to SGDT0 and SGDT1 for the region (e.g., 430, 440, 450, 460, 470) selected for performing the process of step 914. The signal Unsel SGDT0/1 is the voltage applied to SGDT0 and SGDT1 for the regions that are not selected for performing the process of step 914. The signal SGD0/1 is the voltage applied to SGD0 and SGD1 for all regions (e.g., 430, 440, 450, 460, 470) of the selected block. Therefore, SGD0/1 is the voltage applied to SGD0-s 0, SGD1-s 0, SGD0-s 1, SGD1-s 1, SGD0-s 2, SGD1-s 2, SGD0-s 3, SGD1-s 3, SGD0-s 4, and SGD1-s 4. The signal DD0/1 is the voltage applied to DD0 and DD1. The signal WLx is the voltage applied to the selected word line (the word line connected to the memory cells that will have threshold voltages adjusted). The signal WL0 to WLx+1 is the voltage applied to unselected word lines on the source side of the selected word line. The signal WLx+1 to WL161 is the voltage applied to unselected word lines on the drain side of the selected word line. The signal DS0/1 is the voltage applied to DS0 and DS1 (dummy word lines connected to dummy memory cvells). The signal SGS0/1 is the voltage applied to SGS0 and SGS1 for all regions (e.g., 430, 440, 450, 460, 470) of the selected block. The signal SGSB0/1 is the voltage applied to SGSB0 and SGSB1 for all regions (e.g., 430, 440, 450, 460, 470) of the selected block. The signal SL is the voltage applied to the source line SL.
  • All signals start at Vss (ground or Ov). Sel BL is raised to Vdestate (e.g., 18 volts). Vdestate is an example of the erase voltage. Although FIG. 14 shows Vdestate applied to Sel BL as a voltage pulse, other waveforms can also be used. Also, Unsel BL is raised to Vdestate-7.6v, Sel SGDT0/1 is raised to Vdestate-11.2v, Unsel SGDT0/1 is raised to Vdestate, SGD0/1 is raised to Vdestate-7.6v, DD0/1 is raised to Vdestate-10.4v, WL0 to WLx−1 is raised to Vdestate-7.6v, WLx+1 to WL161 is raised to Vdestate-7.6v, WLx remains at 0v (or close to 0v), DS0/1 is raised to Vdestate-10.4v, SGS0/1 is raised to Vdestate-10.v, SGSB0/1 is raised to Vdestate-10.4v, and SL is floating. All signals will return to Vss (ground or 0v).
  • The voltage conditions of FIG. 14 cause GIDL to occur at the drain side (at SGDT0 and/or SGDT1) for NAND strings having a memory cell identified in step 912 to be storing an error bit for the data set and having a threshold voltage in an upper tail. The voltage conditions of FIG. 14 also inhibit GIDL from happening in NAND strings not having a memory cell identified in step 912 to be storing an error bit for the data set and having a threshold voltage in an upper tail. The GIDL causes holes to be generated in the channel of the respected NAND strings and these holes will enter the corresponding charge trapping layer 493 to lower the threshold voltages of memory cells to be corrected. Thus, the control circuit is configured to lower threshold voltages of the identified memory cells to be at lower threshold voltages within the threshold voltage distribution for the first data state by applying GIDL enabling voltages to bit lines and drain side select lines connected to the identified first memory cells and applying GIDL inhibit voltages to bit lines and drain side select lines connected to other memory cells. Note that the voltages depicted in FIG. 14 can be varied for different designs and can be tuned for each instance of the memory manufactured.
  • FIG. 15 is a bit level program signal timing diagram that describes one example implementation of the raising of threshold voltages of the identified memory cells as part of step 918 of FIG. 9 . FIG. 15 depicts the following signals: Inhibit BL, Program BL, Sel/Unsel SGDT0/1, Sel SGD0/1, UnSel SGD0/1,DD0/1, WL0 to WLx−1, WLx, WLx+1 to WL161, DS0/1, SGS0/1, SGSB0/1, and SL. The signal Program BL is the voltage applied to all of the bit lines connected to NAND strings having a memory cell identified in step 916 to be storing an error bit for the data set and have a threshold voltage in a lower tail. The signal Inhibit BL is the voltage applied to all of the bit lines connected to NAND strings not having a memory cell identified in step 916 to be storing an error bit for the data set and have a threshold voltage in a lower tail. The signal Sel/Unsel SGDT0/1 is the voltage applied to SGDT0 and SGDT1 for all regions (e.g., 430, 440, 450, 460, 470) of the block. Therefore, Sel/Unsel SGDT0/1 is the voltage applied to SGDT0-s 0, SGDT1-s 0, SGDT0-s 1, SGDT1-s 1, SGDT0-s 2, SGDT1-s 2, SGDT0-s 3, SGDT1-s 3, SGDT0-s 4, and SGDT1-s 4. The signal Sel SGD0/1 is the voltage applied to SGD0 and SGD1 for the region (e.g., one of 430, 440, 450, 460, 470) selected for performing the process of step 918. The signal Unsel SGD0/1 is the voltage applied to SGD0 and SGD1 for the regions (e.g., all but one of 430, 440, 450, 460, 470) that are not selected for performing the process of step 918.
  • All signals start at Vss (ground or 0v). The signals Unsel SGD0/1, SGS0/1 and SGSB0/1 remain at Vss the entire time period depicted in FIG. 15 . Inhibit BL is first raised to VDDSA (˜2.2v), which is a program inhibit voltage to inhibit any raising of threshold voltages to memory cells connected to bit lines receiving Inhibit BL, while Program BL remains at Vss to enable programming for those memory cells connected to bit lines receiving Program BL. While Inhibit BL is at VDDSA: Sel/Unsel SGDT0/1 is raised to VSGDT (˜6v); Sel SGD0/1 is raised to VSGD (˜2.4v); DD0/1 is raised to VPG (˜4.6v/6.2v); WL0 to WLx−1 is raised to VPASS (˜9v); WLx is raised to VPGM to form a program voltage pulse (similar to step 608 of FIG. 6 ); WLx+1 to WL161 is raised to VPASS, DS0/1 is raised to VPG, and SL is raised to Vx2 (˜1.5-3.5v). While WLx is raised to VPGM, the memory cells identified in step 916 will receive an amount of programming to raise their threshold voltage. In some embodiments, the process of FIG. 15 can be repeated one or more times during an implementation of step 918. In some embodiments, no program verify is performed.
  • Steps 806 and 912/916 include identifying memory cells in upper tails and lower tails of overlapping threshold voltages distributions. In one set of embodiments, the identification of memory cells in upper tails and lower tails of overlapping threshold voltages distributions can be determined on the memory die using a series of latch based operations (as will be discussed in more detail below.
  • FIG. 16 is a flow chart describing one embodiment of a process for reading that is able to recover data from memory cells that have too many errors for the ECC process to correct. The process of FIG. 16 includes identifying memory cells in upper tails and lower tails of overlapping threshold voltages distributions using a series of latch based operations.
  • In step 1602 of FIG. 16 , the memory die (e.g., the control circuit on the memory die) reads a page of data from the set of non-volatile memory cells in overlapping threshold voltage distributions. In one embodiment, the reading of a page of data comprises performing one or more sensing operations to sense the page of data (step 1604) and performing an extra sensing operation not required to sense the page of data (step 1606). For example, when reading the lower page of data for memory cells storing data according to the embodiment of FIG. 5D, performing one or more sensing operations to sense the page of data (step 1604) includes sensing at VrA and VrE (see FIG. 11A) and performing an extra sensing operation not required to sense the page of data (step 1606) comprises (for example) reading at VrB, VrC or VrD. For purposes of this document (including the discussion of FIGS. 16-22 ) the “memory die” can refer to a memory die 200 (or another memory die that includes the associated peripheral circuitry comprising all or a portion of the control circuit) or integrated memory assembly 207 that includes memory cells on one die bonded to another die that includes the associated peripheral circuitry comprising all or a portion of the control circuit. Step 1602 is an example implementation of steps 802, 902 and/or 908.
  • In step 1608, the memory die (e.g., the control circuit on the memory die) transfers the page of data read to the memory controller (e.g., memory controller on a separate die from the control circuit). In step 1610, the memory controller performs ECC process on the transferred page of data read and identifies error bits in the page of data read. In step 1612, the memory controller transfers an identification of the error bits in the page of data read to the memory die (e.g., the control circuit on the memory die). In step 1614, the memory die (e.g., the control circuit on the memory die) receives from memory controller the identification of error bits in the page of data read.
  • In step 1616, based on the received indication of error bits in the page of data read and the extra sensing operation not required to sense the page of data, the memory die (e.g., the control circuit on the memory die) identifies memory cells storing the page of data that are in an upper tail of a first threshold voltage distribution. In step 1618, based on the received indication of error bits in the page of data read and the extra sensing operation not required to sense the page of data, the memory die (e.g., the control circuit on the memory die) identifies memory cells storing the page of data that are in a lower tail of a second threshold voltage distribution. In one embodiment, the center of the first threshold voltage distribution is higher in voltage magnitude than the center of the second threshold voltage distribution. Steps 1610, 1616 and 1618 together are an example implementation of step 806. Steps 1602-1618 are also an example implementation of steps 908, 910, 912 and 916. Thus, in one set of embodiments, the control circuit can determine that the data was not read successfully and identify memory cells that are in the upper tail of the first threshold voltage distribution and identify memory cells in that are in the lower tail of the second threshold voltage distribution in response to determining that the data was not read successfully.
  • In step 1620, the memory die (e.g., the control circuit on the memory die) adjusts memory cells that are identified to be in the upper tail of the first threshold voltage distribution and memory cells that are identified to be in the lower tail of the second threshold voltage distribution. In one embodiment, the adjusting of the memory cells in step 920 comprises the memory die (e.g., the control circuit on the memory die) lowering threshold voltages of identified memory cells storing the page of data that are in the upper tail of the first threshold voltage distribution (e.g., to be at lower threshold voltages within the first threshold voltage distribution without lowering the threshold voltages to be lower than the first threshold voltage distribution) in step 1622 and the memory die (e.g., the control circuit on the memory die) raises threshold voltages of identified memory cells storing the page of data that are in the lower tail of the second threshold voltage distribution (e.g., to be at higher threshold voltages within the second threshold voltage distribution without lowering the threshold voltages to be lower than the second threshold voltage distribution) in step 1624. In one embodiment, the control circuit is configured to lower threshold voltages using GIDL (as explained above). Step 1620 is an example implementation of step 808 and an example of steps 914 & 918. After the process of FIG. 16 , the control circuit is configured to persistently maintain the memory cells in the set of non-volatile memory cells that are in the lower tail of the second threshold voltage distribution after the raising and persistently maintain the memory cells in the set of non-volatile memory cells that are in the upper tail of a first threshold voltage distribution after the lowering.
  • The process of FIG. 16 includes reading data for one page of data. As discussed above with respect to FIGS. 5B-5E, some memory cells store data in multiple pages of data, in which case the process of FIG. 16 is performed separately (or concurrently) for each page of data.
  • FIG. 17 is a flow chart describing one embodiment of a process for reading a lower page of data when memory cells store three bits of data per memory cell, in three different pages (e.g., as per FIG. 5D and Table 2). The process of FIG. 17 includes identifying memory cells in upper tails and lower tails of overlapping threshold voltages distributions using a series of latch based operations. In one embodiment, each memory cell has access to a set of ADL, BDL, CDL, XDL and SDL, as discussed above with respect to FIG. 2C. The process of FIG. 17 describes one example implementation of the process of FIG. 16 for reading a lower page of data (“LP”).
  • Step 1702 of FIG. 17 includes the memory die performing three sensing operations. First, the memory die performs an E read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrE. The results of the E read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310) to the ADL latch. If the memory cell being read has its threshold voltage less than VrE, then a “1” is stored in ADL. If the memory cell being read has its threshold voltage greater than VrE, then a “0” is stored in ADL. For example, the voltage VrE can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrE then a 1 is stored in ADL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in ADL. Second, the memory die performs an C read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrC. The results of the C read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310) to the BDL latch. If the memory cell being read has its threshold voltage less than VrC, then a “1” is stored in BDL. If the memory cell being read has its threshold voltage greater than VrC, then a “0” is stored in BDL. For example, the voltage VrC can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrC then a 1 is stored in BDL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in BDL. Third, the memory die performs an A read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrA. The results of the A read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310) to the CDL latch. If the memory cell being read has its threshold voltage less than VrA, then a “1” is stored in CDL. If the memory cell being read has its threshold voltage greater than VrA, then a “0” is stored in CDL. For example, the voltage VrA can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrA then a 1 is stored in CDL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in CDL. Processor 320 is then used to calculate the lower page data by calculating the lower page data LP as: LP=˜(ADL&˜CDL). The lower page data LP is stored in XDL. The calculated lower page data LP is then stored in XDL. Step 1702 is performed for each memory cell being read. In step 1702, performing the E Read sensing and the A read sensing correspond to step 1604, and performing the C read sensing corresponds to step 1606. Step 1702 is performed on and by the memory die (e.g., memory die 200 or integrated memory assembly 207).
  • In step 1704, the memory die transfers the lower page data LP from XDL latches to the memory controller 120. Step 1704 corresponds to step 1608. In step 1706 (corresponding to step 1610), memory controller 120 performs the ECC process (e.g., using ECC Engine 158) to decode the data (see discussion above). The results of the ECC process (LP_ECC) is used to create an identification of error bits “error_bits” by computing error_bits=LP+LP_ECC (the exclusive OR of LP and LP_ECC). The identification of error bits (error_bits) is transferred from memory controller 120 to the memory die in step 1708 (corresponding to step 1612).
  • Step 1710 (corresponding to steps 1616-1620) comprises the memory dic identifying memory cells in one or more tails of one or more threshold voltage distributions and adjusting those memory cells that are identified to be in a tail of a threshold voltage distribution. The error_bits received by the memory die in step 1708 is first received at and stored in the XDL latches. In step 1710, the contents of the XDL latches (i.e. error_bits) are moved to SDL latches.
  • For the lower page of data, there are four sets of error bits: (1) A-to-Er error bits; (2) Er-to-A error bits; (3) D-to-E error bits; and (4) E-to-D error bits. For purposes of this document, A-to-Er error bits are memory cells that should be in data state A but have threshold voltages that put them in state E (e.g., they are in a lower tail of the threshold voltage distribution for data state A); Er-to-A error bits are memory cells that should be in data state Er but have threshold voltages that put them in state A (e.g., they are in an upper tail of the threshold voltage distribution for data state Er); D-to-E error bits are memory cells that should be in data state D but have threshold voltages that put them in state E (e.g., they are in an upper tail of the threshold voltage distribution for data state D); and E-to-D error bits are memory cells that should be in data state E but have threshold voltages that put them in state D (e.g., they are in a lower tail of the threshold voltage distribution for data state E).
  • The identifying memory cells in lower tails (see also steps 916 and 1618) comprises identifying A-to-Er error bits and identifying E-to-D error bits. The A-to-Er error bits are identified and stored in XDL by processor 320 calculating XDL-CDL & SDL. After identifying A-to-Er error bits, the A-to-Er error bits have their threshold voltages raised (see also step 918 and step 1624); for example, using the process of FIG. 15 . The E-to-D error bits are identified and stored in XDL by processor 320 calculating XDL=ADL &˜BDL & SDL. After identifying E-to-D error bits, E-to-D error bits have their threshold voltages raised (see also step 918 and step 1624); for example, using the process of FIG. 15 . Note that BDL was storing the data from the C read sensing, and is used to distinguish between E-to-D error bits and other error_bits in data state Er and data state A.
  • The identifying memory cells in upper tails (see also steps 912 and 1616) comprises identifying Er-to-A error bits and identifying D-to-E error bits. The Er-to-A error bits are identified and stored in XDL by processor 320 calculating XDL=˜CDL & BDL & SDL. After identifying Er-to-A error bits, the Er-to-A error bits have their threshold voltages lowered (see also step 914 and step 1622); for example, using the process of FIG. 14 . The D-to-E error bits are identified and stored in XDL by processor 320 calculating XDL=˜ADL & SDL. After identifying D-to-E error bits, D-to-E error bits have their threshold voltages lowered (see also step 914 and step 1622); for example, using the process of FIG. 14 . Note that BDL was storing the data from the C read sensing, and is used to distinguish between Er-to-A error bits and other error_bits in data state D and data state E. The process of FIG. 17 is performed concurrently on all memory cells being read.
  • FIG. 18 depicts waveforms of the voltage applied to the control gates of memory cells being read. FIG. 18 shows two waveforms: (1) the Standard Lower Page Read waveform and (2) the Proposed Lower Page Read for In-Place Error Correction waveform. The Standard Lower Page Read waveform is applied to the control gates of the memory cells being read via the word line connected to those memory cells being read in prior art read processes. The Proposed Lower Page Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read via the word line connected to those memory cells being read when performing step 1702. As mentioned above, step 1702 includes sensing at VrE, VrC and VrA; therefore, the Proposed Lower Page Read for In-Place Error Correction waveform that is applied to the control gates of the memory cells being read (after a Vread spike) is set to VrE, then VrC and then VrA.
  • FIG. 19 is a flow chart describing one embodiment of a process for reading an upper page of data when memory cells store three bits of data per memory cell, in three different pages (e.g., as per FIG. 5D and Table 2). The process of FIG. 19 includes identifying memory cells in upper tails and lower tails of overlapping threshold voltages distributions using a series of latch based operations. The process of FIG. 19 describes one example implementation of the process of FIG. 16 for reading an upper page of data (“UP”).
  • Step 1902 of FIG. 19 includes the memory die performing three sensing operations. First, the memory die performs a G read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrG. The results of the G read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310) to the ADL latch. If the memory cell being read has its threshold voltage less than VrG, then a “1” is stored in ADL. If the memory cell being read has its threshold voltage greater than VrE, then a “0” is stored in ADL. For example, the voltage VrG can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrG then a 1 is stored in ADL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in ADL. Second, the memory die performs an E read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrE. The results of the E read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310) to the BDL latch. If the memory cell being read has its threshold voltage less than VrE, then a “1” is stored in BDL. If the memory cell being read has its threshold voltage greater than VrE, then a “0” is stored in BDL. For example, the voltage VrE can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrE then a 1 is stored in BDL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in BDL. Third, the memory die performs a C read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrC. The results of the C read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310) to the CDL latch. If the memory cell being read has its threshold voltage less than VrC, then a “1” is stored in CDL. If the memory cell being read has its threshold voltage greater than VrC, then a “0” is stored in CDL. For example, the voltage VrC can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrC then a 1 is stored in CDL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in CDL. Processor 320 is then used to calculate the upper page data by calculating the upper page data UP as: UP=˜(ADL&˜CDL). The upper page data UP is stored in XDL. In step 1902, performing the G read sensing and the C read sensing correspond to step 1604, and performing the E read sensing corresponds to step 1606. Step 1902 is performed on and by the memory die (e.g., memory die 200 or integrated memory assembly 207).
  • In step 1904, the memory die transfers the upper page data UP from XDL latches to the memory controller 120. Step 1904 corresponds to step 1608. In step 1906 (corresponding to step 1610), memory controller 120 performs the ECC process (e.g., using ECC Engine 158) to decode the data (see discussion above). The results of the ECC process (UP_ECC) is used to create an identification of error bits “error_bits” by computing error_bits=UP⊕UP_ECC (the exclusive OR of UP and UP_ECC). The identification of error bits (error_bits) is transferred from memory controller 120 to the memory die in step 1908 (corresponding to step 1612).
  • Step 1910 (corresponding to steps 1616-1620) comprises the memory die identifying memory cells in one or more tails of one or more threshold voltage distributions and adjusting those memory cells that are identified to be in a tail of a threshold voltage distribution. The error_bits received by the memory die in step 1908 are first received at and stored in the XDL latches. In step 1910, the contents of the XDL latches (i.e. error_bits) are moved to SDL latches.
  • For the upper page of data, there are four sets of error bits: (1) C-to-B error bits; (2) B-to-C error bits; (3) F-to-G error bits; and (4) G-to-F error bits. For purposes of this document, C-to-B error bits are memory cells that should be in data state C but have threshold voltages that put them in state B (e.g., they are in a lower tail of the threshold voltage distribution for data state C); B-to-C error bits are memory cells that should be in data state B but have threshold voltages that put them in state C (e.g., they are in an upper tail of the threshold voltage distribution for data state B); F-to-G error bits are memory cells that should be in data state F but have threshold voltages that put them in state G (e.g., they are in an upper tail of the threshold voltage distribution for data state F); and G-to-F error bits are memory cells that should be in data state G but have threshold voltages that put them in state F (e.g., they are in a lower tail of the threshold voltage distribution for data state G).
  • The identifying memory cells in lower tails (see also steps 916 and 1618) comprises identifying C-to-B error bits and identifying G-to-F error bits. The C-to-B error bits are identified and stored in XDL by processor 320 calculating XDL=CDL & SDL. After identifying C-to-B error bits, the C-to-B error bits have their threshold voltages raised (see also step 918 and step 1624); for example, using the process of FIG. 15 . The G-to-F error bits are identified and stored in XDL by processor 320 calculating XDL=ADL &˜BDL & SDL. After identifying G-to-F error bits, G-to-F error bits have their threshold voltages raised (see also step 918 and step 1624); for example, using the process of FIG. 15 . Note that BDL was storing the data from the E read sensing, and is used to distinguish between G-to-F error bits and other error_bits in data state B and data state C.
  • The identifying memory cells in upper tails (see also steps 912 and 1616) comprises identifying B-to-C error bits and identifying F-to-G error bits. The B-to-C error bits are identified and stored in XDL by processor 320 calculating XDL=˜CDL & BDL & SDL. After identifying B-to-C error bits, the B-to-C error bits have their threshold voltages lowered (see also step 914 and step 1622); for example, using the process of FIG. 14 . The F-to-G error bits are identified and stored in XDL by processor 320 calculating XDL=˜ADL & SDL. After identifying F-to-G error bits, F-to-G error bits have their threshold voltages lowered (see also step 914 and step 1622); for example, using the process of FIG. 14 . Note that BDL was storing the data from the E read sensing, and is used to distinguish between B-to-C error bits and other error_bits in data state G and data state F. The process of FIG. 19 is performed concurrently on all memory cells being read.
  • FIG. 20 depicts waveforms of the voltage applied to the control gates of memory cells being read. FIG. 20 shows two waveforms: (1) the Standard Upper Page Read waveform and (2) the Proposed Upper Page Read for In-Place Error Correction waveform. The Standard Upper Page Read waveform is applied to the control gates of the memory cells being read via the word line connected to those memory cells being read in prior art read processes. The Proposed Upper Page Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read via the word line connected to those memory cells being read when performing step 1902. As mentioned above, step 1902 includes sensing at VrG, VrE and VrC; therefore, the Proposed Upper Page Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read (after a Vread spike) is set to VrG, then VrE and then VrC.
  • FIG. 21 is a flow chart describing one embodiment of a process for reading a middle page of data when memory cells store three bits of data per memory cell, in three different pages (e.g., as per FIG. 5D and Table 2). The process of FIG. 21 includes identifying memory cells in upper tails and lower tails of overlapping threshold voltages distributions using a series of latch based operations. The process of FIG. 21 describes one example implementation of the process of FIG. 16 for reading a middle page of data (“MP”).
  • Step 2102 of FIG. 21 includes the memory die performing four sensing operations. First, the memory die performs a F read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrF. The results of the F read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310) to the SDL latch. If the memory cell being read has its threshold voltage less than VrF, then a “1” is stored in SDL. If the memory cell being read has its threshold voltage greater than VrF, then a “O” is stored in SDL. For example, the voltage VrF can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrF then a 1 is stored in SDL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in SDL.
  • Second, the memory die performs a D read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrD. The results of the D read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310) to the ADL latch. If the memory cell being read has its threshold voltage less than VrD, then a “1” is stored in ADL. If the memory cell being read has its threshold voltage greater than VrD, then a “0” is stored in ADL. For example, the voltage VrD can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrD then a 1 is stored in ADL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in BDL.
  • Third, the memory die performs a C read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VIC. The results of the C read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310) to the BDL latch. If the memory cell being read has its threshold voltage less than VrC, then a “1” is stored in BDL. If the memory cell being read has its threshold voltage greater than VrC, then a “0” is stored in BDL. For example, the voltage VrC can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrC then a 1 is stored in BDL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in BDL.
  • Fourth, the memory die performs an B read sensing, which comprises determining whether memory cells have threshold voltages greater than or equal to VrB. The results of the B read sensing are transmitted from the sense amplifier (e.g., from sense circuitry 310) to the CDL latch. If the memory cell being read has its threshold voltage less than VrB, then a “1” is stored in CDL. If the memory cell being read has its threshold voltage greater than VrB, then a “0” is stored in CDL. For example, the voltage VrB can be applied to the control gate of the memory cell being read (e.g., via the word line) and if the memory cell turns on (e.g., conducts sufficient current) in response to VrB then a 1 is stored in CDL, while if the memory cell does not turn on (e.g., does not conducts sufficient current) then a 0 is stored in CDL.
  • Processor 320 is then used to calculate the middle page data by calculating the middle page data MP as: MP=˜(˜CDL& (˜ADL&SDL). The middle page data MP is stored in XDL. In step 1902, performing the F Read sensing, D read sensing and the B read sensing correspond to step 1604, and performing the C read sensing corresponds to step 1606. Step 2102 is performed on and by the memory die (e.g., memory die 200 or integrated memory assembly 207).
  • In step 2104, the memory die transfers the middle page data MP from XDL latches to the memory controller 120. Step 2104 corresponds to step 1608. In step 2106 (corresponding to step 1610), memory controller 120 performs the ECC process (e.g., using ECC Engine 158) to decode the data (see discussion above). The results of the ECC process (MP_ECC) is used to create an identification of error bits “error_bits” by computing error_bits=MP⊕MP_ECC (the exclusive OR of MP and MP_ECC). The identification of error bits (error_bits) is transferred from memory controller 120 to the memory die in step 2108 (corresponding to step 1612).
  • Steps 2110 and 2114 (corresponding to steps 1616-1620) comprises the memory die identifying memory cells in one or more tails of one or more threshold voltage distributions and adjusting those memory cells that are identified to be in a tail of a threshold voltage distribution. The error_bits received by the memory die in step 2108 is first received at and stored in the XDL latches. In step 2110, the contents of the XDL latches (ie error_bits) are moved to SDL latches.
  • For the middle page of data, there are six sets of error bits: (1) B-to-A error bits; (2) A-to-B error bits; (3) D-to-C error bits; (4) C-to-D error bits; (5) E-to-F error bits; and (6) F-to-E error bits. For purposes of this document, B-to-A error bits are memory cells that should be in data state B but have threshold voltages that put them in state A (e.g., they are in a lower tail of the threshold voltage distribution for data state B); A-to-B error bits are memory cells that should be in data state A but have threshold voltages that put them in state B (e.g., they are in an upper tail of the threshold voltage distribution for data state A); D-to-C error bits are memory cells that should be in data state D but have threshold voltages that put them in state C (e.g., they are in a lower tail of the threshold voltage distribution for data state D); C-to-D error bits are memory cells that should be in data state C but have threshold voltages that put them in state D (e.g., they are in an upper tail of the threshold voltage distribution for data state C); E-to-F error bits are memory cells that should be in data state E but have threshold voltages that put them in state F (e.g., they are in an upper tail of the threshold voltage distribution for data state E); and F-to-E error bits are memory cells that should be in data state F but have threshold voltages that put them in state E (e.g., they are in a lower tail of the threshold voltage distribution for data state F).
  • The identifying memory cells in lower tails (see also steps 916 and 1618) comprises identifying B-to-A error bits in step 2110, identifying D-to-C error bits in step 2110 and identifying F-to-E error bits in step 2114. The B-to-A error bits are identified and stored in XDL by processor 320 calculating XDL=CDL & SDL. After identifying B-to-A error bits, the B-to-A error bits have their threshold voltages raised (see also step 918 and step 1624); for example, using the process of FIG. 15 . The D-to-C error bits are identified and stored in XDL by processor 320 calculating XDL=ADL &˜BDL & SDL. After identifying D-to-C error bits, D-to-C error bits have their threshold voltages raised (see also step 918 and step 1624); for example, using the process of FIG. 15 . Note that BDL was storing the data from the C read sensing, and is used to distinguish between D-to-C error bits and other error_bits in data state B and data state C.
  • The identifying memory cells in upper tails (see also steps 912 and 1616) comprises identifying A-to-B error bits in step 2110, identifying C-to-D error bits in step 2114, and identifying E-to-D error bits in step 2114. The A-to-B error bits are identified in step 2110 and stored in XDL by processor 320 calculating XDL=˜CDL & BDL & SDL. After identifying A-to-B error bits, the A-to-B error bits have their threshold voltages lowered (see also step 914 and step 1622); for example, using the process of FIG. 14 .
  • In step 2112, the memory die preforms two sensing operations: F read sensing (results stores in BDL) and E read sensing (results stored in CDL). The F read sensing corresponds to step 1604 and the E read sensing corresponds to step 1606.
  • The C-to-D error bits are identified in step 2114 and stored in XDL by processor 320 calculating XDL=ADL & SDL. After identifying C-to-D error bits, C-to-D error bits have their threshold voltages lowered (see also step 914 and step 1622); for example, using the process of FIG. 14 . The E-to-F error bits are identified in step 2114 and stored in XDL by processor 320 calculating XDL=˜ADL & CDL & SDL. After identifying E-to-F error bits, E-to-F error bits have their threshold voltages lowered (see also step 914 and step 1622); for example, using the process of FIG. 14 .
  • The F-to-E error bits are identified in step 2114 and stored in XDL by processor 320 calculating XDL=BDL &˜CDL & SDL. After identifying F-to-E error bits, F-to-E error bits have their threshold voltages raised (see also step 918 and step 1624); for example, using the process of FIG. 15 . The process of FIG. 21 is performed concurrently on all memory cells being read.
  • FIG. 22 depicts waveforms of the voltage applied to the control gates of memory cells being read. FIG. 22 shows three waveforms: (1) the Standard Middle Page Read waveform, (2) the Proposed Middle Page First Read for In-Place Error Correction waveform and (3) the Proposed Middle Page Second Read for In-Place Error Correction waveform. The Standard Middle Page Read waveform is applied to the control gates of the memory cells being read via the word line connected to those memory cells being read in prior art read processes. The Proposed Middle Page First Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read via the word line connected to those memory cells being read when performing step 2102. As mentioned above, step 2102 includes sensing at VrF, VrD, VrC and VrB; therefore, the Proposed Middle Page First Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read (after a Vread spike) is set to VrF, then VrD, then VrC and then VrB.
  • The Proposed Middle Page Second Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read via the word line connected to those memory cells being read when performing step 2112. As mentioned above, step 2112 includes sensing at VrF and VrE; therefore, the Proposed Middle Page Second Read for In-Place Error Correction waveform is applied to the control gates of the memory cells being read (after a Vread spike) is set to VrF and then VrE.
  • A non-volatile memory has been proposed that reduces errors in data stored by identifying memory cells in upper tails and lower tails of the overlapping threshold voltages distributions and adjusting threshold voltages of the identified memory cells to be closer to centers of the overlapping threshold voltages distributions without changing threshold voltages distributions for the identified memory cells. The proposed system only needs two data transfers (one transfer of data read from the memory die to the memory controller and one identification of error bits in the data read from the memory controller to the memory die), which reduces data transfer time. Much of the logic operation is performed on the memory die, enabling faster error correction.
  • One embodiment includes a non-volatile storage apparatus, comprising a set of non-volatile memory cells and a control circuit connected to the non-volatile memory cells. The control circuit is configured to: read data from the set of non-volatile memory cells, transfer the data read to an off-die circuit, receive from the off-die circuit an identification of error bits in the data read, based on the received identification of error bits in the data read, identify memory cells in the set of non-volatile memory cells that are in an upper tail of a first threshold voltage distribution, based on the received identification of error bits in the data read, identify memory cells in the set of non-volatile memory cells that are in a lower tail of a second threshold voltage distribution, and adjust memory cells that are identified to be in the upper tail of the first threshold voltage distribution and memory cells that are identified to be in the lower tail of the second threshold voltage distribution.
  • In one example implementation, the control circuit is configured to adjust memory cells that are identified to be in the upper tail of the first threshold voltage distribution and memory cells that are identified to be in the lower tail of the second threshold voltage distribution by: lowering threshold voltages of memory cells that are identified to be in the upper tail of the first threshold voltage distribution; and raising threshold voltages of memory cells that are identified to be in the lower tail of the second threshold voltage distribution.
  • In one example implementation, the lowering threshold voltages comprises lowering threshold voltages of memory cells that are identified to be in the upper tail of the first threshold voltage distribution to be at lower threshold voltages within the first threshold voltage distribution without lowering the threshold voltages to be lower than the first threshold voltage distribution; and the raising threshold voltages comprises raising threshold voltages of memory cells that are identified to be in the lower tail of the second threshold voltage distribution to be at higher threshold voltages within the second threshold voltage distribution without lowering the threshold voltages to be lower than the second threshold voltage distribution.
  • In one example implementation, the control circuit is configured to lower threshold voltages using gate induced drain leakage (GIDL) to lower threshold voltages.
  • In one example implementation, the control circuit is configured to persistently maintain the memory cells in the set of non-volatile memory cells that are in the lower tail of the second threshold voltage distribution after the raising; and the control circuit is configured to persistently maintain the memory cells in the set of non-volatile memory cells that are in the upper tail of a first threshold voltage distribution after the lowering.
  • In one example implementation, the data read from the set of non-volatile memory cells is a page of data; the control circuit is configured to read data from the set of non-volatile memory cells by reading the page of data from the set of non-volatile memory cells including performing one or more sensing operations to sense the page of data and performing an extra sensing operation not required to sense the page of data; the control circuit is configured to identify memory cells in the set of non-volatile memory cells that are in the upper tail of the first threshold voltage distribution based on the received identification of error bits in the data read and the extra sensing operation not required to sense the page of data; and the control circuit is configured to identify memory cells in the set of non-volatile memory cells that are in the lower tail of the second threshold voltage distribution based on the received identification of error bits in the data read and the extra sensing operation not required to sense the page of data.
  • In one example implementation, the control circuit is configured to adjust memory cells that are identified to be in the upper tail of the first threshold voltage distribution and memory cells that are identified to be in the lower tail of the second threshold voltage distribution by: lowering threshold voltages of memory cells that are identified to be in the upper tail of the first threshold voltage distribution; and raising threshold voltages of memory cells that are identified to be in the lower tail of the second threshold voltage distribution.
  • In one example implementation, the off-die circuit is a memory controller on a separate die from the control circuit.
  • One example implementation further comprises a memory controller. The memory controller is the off-die circuit. The memory controller is configured to perform an error correction process on the data read that was transferred from the control circuit, identify error bits in the data read, and transfer an identification of the error bits in the data read to the control circuit.
  • In one example implementation, the control circuit is configured to determine that the data was not read successfully; and the control circuit is configured to identify memory cells in the set of non-volatile memory cells that are in the upper tail of the first threshold voltage distribution and identify memory cells in the set of non-volatile memory cells that are in the lower tail of the second threshold voltage distribution in response to determining that the data was not read successfully.
  • In one example implementation, a center of the first threshold voltage distribution is higher in voltage magnitude than a center of the second threshold voltage distribution.
  • One embodiment includes a method comprising: reading a page of data from the set of non-volatile memory cells including performing one or more sensing operations to sense the page of data and performing an extra sensing operation not required to sense the page of data; performing an error correction process on the page of data read and identifying error bits in the page of data read based on the error correction process; based on the identification of error bits in the page of data read and the extra sensing operation not required to sense the page of data, identifying memory cells in the set of non-volatile memory cells that are in a tail of a threshold voltage distribution; and adjusting the memory cells that are identified to be in the tail of the threshold voltage distribution.
  • In one example implementation, the identifying comprises: based on the received indication of error bits in the page of data read and the extra sensing operation not required to sense the page of data, identifying memory cells storing the page of data that are in an upper tail of a first threshold voltage distribution and identifying memory cells storing the page of data that are in a lower tail of a second threshold voltage distribution; and the adjusting comprises: lowering threshold voltages of identified memory cells storing the page of data that are in the upper tail of the first threshold voltage distribution, and raising threshold voltages of identified memory cells storing the page of data that are in the lower tail of the second threshold voltage distribution.
  • In one example implementation, a center of the first threshold voltage distribution is higher in voltage magnitude than a center of the second threshold voltage distribution.
  • In one example implementation, the lowering comprises lowering threshold voltages of identified memory cells storing the page of data that are in the upper tail of the first threshold voltage distribution to be at lower threshold voltages within the first threshold voltage distribution without lowering the threshold voltages to be lower than the first threshold voltage distribution; and the raising comprises raising threshold voltages of memory cells that are identified to be in the lower tail of the second threshold voltage distribution to be at higher threshold voltages within the second threshold voltage distribution without lowering the threshold voltages to be lower than the second threshold voltage distribution.
  • In one example implementation, the lowering threshold voltages uses gate induced drain leakage (GIDL) to lower threshold voltages.
  • One example implementation further comprises: persistently maintaining the memory cells that are in the lower tail of the second threshold voltage distribution after the raising; and persistently maintaining the memory cells that are in the upper tail of a first threshold voltage distribution after the lowering.
  • In one example implementation, the reading, identifying and adjusting are performed on a memory die; and the performing the error correction process on the page of data read and identifying error bits are performed on a memory controller die separate from the memory die.
  • In one example implementation, the set of non-volatile memory cells each store three bits of data per memory cell; and the process of reading, identifying and adjusting are performed separately for each page of data.
  • One embodiment includes a non-volatile storage apparatus, comprising a memory die and a memory controller off the memory die and connected to the memory die. The memory die comprises a set of non-volatile memory cells and a control circuit connected to the non-volatile memory cells. The control circuit is configured to read a page of data from the set of non-volatile memory cells including performing one or more sensing operations to sense the page of data and performing an extra sensing operation not required to sense the page of data. The control circuit is configured to transfer the page of data read to the memory controller. The memory controller is configured to perform an error correction process on the transferred page of data read, identify error bits in the page of data read, and transfer an identification of the error bits in the page of data read to the memory die. The control circuit is configured to: receive from memory controller the identification of error bits in the page of data read, and based on the received indication of error bits in the page of data read and the extra sensing operation not required to sense the page of data, identify memory cells storing the page of data that are in an upper tail of a first threshold voltage distribution and identify memory cells storing the page of data that are in a lower tail of a second threshold voltage distribution, lower threshold voltages of identified memory cells storing the page of data that are in the upper tail of the first threshold voltage distribution, and raise threshold voltages of identified memory cells storing the page of data that are in the lower tail of the second threshold voltage distribution.
  • For purposes of this document, reference in the specification to “an embodiment,” “one embodiment,” “some embodiments,” or “another embodiment” may be used to describe different embodiments or the same embodiment.
  • For purposes of this document, a connection may be a direct connection or an indirect connection (e.g., via one or more other parts). In some cases, when an element is referred to as being connected or coupled to another element, the element may be directly connected to the other element or indirectly connected to the other element via one or more intervening elements. When an element is referred to as being directly connected to another element, then there are no intervening elements between the element and the other element. Two devices are “in communication” if they are directly or indirectly connected so that they can communicate electronic signals between them.
  • For purposes of this document, the term “based on” may be read as “based at least in part on.”
  • For purposes of this document, without additional context, use of numerical terms such as a “first” object, a “second” object, and a “third” object may not imply an ordering of objects, but may instead be used for identification purposes to identify different objects.
  • For purposes of this document, the term “set” of objects may refer to a “set” of one or more of the objects.
  • The foregoing detailed description has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the proposed technology and its practical application, to thereby enable others skilled in the art to best utilize it in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope be defined by the claims appended hereto.

Claims (20)

What is claimed is:
1. A non-volatile storage apparatus, comprising:
a set of non-volatile memory cells; and
a control circuit connected to the non-volatile memory cells, the control circuit is configured to:
read data from the set of non-volatile memory cells,
transfer the data read to an off-die circuit,
receive from the off-die circuit an identification of error bits in the data read,
based on the received identification of error bits in the data read, identify memory cells in the set of non-volatile memory cells that are in an upper tail of a first threshold voltage distribution,
based on the received identification of error bits in the data read, identify memory cells in the set of non-volatile memory cells that are in a lower tail of a second threshold voltage distribution, and
adjust memory cells that are identified to be in the upper tail of the first threshold voltage distribution and memory cells that are identified to be in the lower tail of the second threshold voltage distribution.
2. The non-volatile storage apparatus of claim 1, wherein:
the control circuit is configured to adjust memory cells that are identified to be in the upper tail of the first threshold voltage distribution and memory cells that are identified to be in the lower tail of the second threshold voltage distribution by:
lowering threshold voltages of memory cells that are identified to be in the upper tail of the first threshold voltage distribution; and
raising threshold voltages of memory cells that are identified to be in the lower tail of the second threshold voltage distribution.
3. The non-volatile storage apparatus of claim 2, wherein:
the lowering threshold voltages comprises lowering threshold voltages of memory cells that are identified to be in the upper tail of the first threshold voltage distribution to be at lower threshold voltages within the first threshold voltage distribution without lowering the threshold voltages to be lower than the first threshold voltage distribution; and
the raising threshold voltages comprises raising threshold voltages of memory cells that are identified to be in the lower tail of the second threshold voltage distribution to be at higher threshold voltages within the second threshold voltage distribution without lowering the threshold voltages to be lower than the second threshold voltage distribution.
4. The non-volatile storage apparatus of claim 3, wherein:
the control circuit is configured to lower threshold voltages using gate induced drain leakage (GIDL) to lower threshold voltages.
5. The non-volatile storage apparatus of claim 2, wherein:
the control circuit is configured to persistently maintain the memory cells in the set of non-volatile memory cells that are in the lower tail of the second threshold voltage distribution after the raising; and
the control circuit is configured to persistently maintain the memory cells in the set of non-volatile memory cells that are in the upper tail of a first threshold voltage distribution after the lowering.
6. The non-volatile storage apparatus of claim 1, wherein:
the data read from the set of non-volatile memory cells is a page of data;
the control circuit is configured to read data from the set of non-volatile memory cells by reading the page of data from the set of non-volatile memory cells including performing one or more sensing operations to sense the page of data and performing an extra sensing operation not required to sense the page of data;
the control circuit is configured to identify memory cells in the set of non-volatile memory cells that are in the upper tail of the first threshold voltage distribution based on the received identification of error bits in the data read and the extra sensing operation not required to sense the page of data; and
the control circuit is configured to identify memory cells in the set of non-volatile memory cells that are in the lower tail of the second threshold voltage distribution based on the received identification of error bits in the data read and the extra sensing operation not required to sense the page of data.
7. The non-volatile storage apparatus of claim 6, wherein:
the control circuit is configured to adjust memory cells that are identified to be in the upper tail of the first threshold voltage distribution and memory cells that are identified to be in the lower tail of the second threshold voltage distribution by:
lowering threshold voltages of memory cells that are identified to be in the upper tail of the first threshold voltage distribution; and
raising threshold voltages of memory cells that are identified to be in the lower tail of the second threshold voltage distribution.
8. The non-volatile storage apparatus of claim 1, wherein:
the off-die circuit is a memory controller on a separate die from the control circuit.
9. The non-volatile storage apparatus of claim 1, further comprising:
a memory controller, the memory controller is the off-die circuit; and
the memory controller is configured to perform an error correction process on the data read that was transferred from the control circuit, identify error bits in the data read, and transfer an identification of the error bits in the data read to the control circuit.
10. The non-volatile storage apparatus of claim 1, wherein:
the control circuit is configured to determine that the data was not read successfully; and
the control circuit is configured to identify memory cells in the set of non-volatile memory cells that are in the upper tail of the first threshold voltage distribution and identify memory cells in the set of non-volatile memory cells that are in the lower tail of the second threshold voltage distribution in response to determining that the data was not read successfully.
11. The non-volatile storage apparatus of claim 1, wherein:
a center of the first threshold voltage distribution is higher in voltage magnitude than a center of the second threshold voltage distribution.
12. A method, comprising:
reading a page of data from the set of non-volatile memory cells including performing one or more sensing operations to sense the page of data and performing an extra sensing operation not required to sense the page of data;
performing an error correction process on the page of data read and identifying error bits in the page of data read based on the error correction process;
based on the identification of error bits in the page of data read and the extra sensing operation not required to sense the page of data, identifying memory cells in the set of non-volatile memory cells that are in a tail of a threshold voltage distribution; and
adjusting the memory cells that are identified to be in the tail of the threshold voltage distribution.
13. The method of claim 12, wherein:
the identifying comprises:
based on the received indication of error bits in the page of data read and the extra sensing operation not required to sense the page of data, identifying memory cells storing the page of data that are in an upper tail of a first threshold voltage distribution and identifying memory cells storing the page of data that are in a lower tail of a second threshold voltage distribution; and
the adjusting comprises:
lowering threshold voltages of identified memory cells storing the page of data that are in the upper tail of the first threshold voltage distribution, and
raising threshold voltages of identified memory cells storing the page of data that are in the lower tail of the second threshold voltage distribution.
14. The method of claim 13, wherein:
a center of the first threshold voltage distribution is higher in voltage magnitude than a center of the second threshold voltage distribution.
15. The method of claim 13, wherein:
the lowering comprises lowering threshold voltages of identified memory cells storing the page of data that are in the upper tail of the first threshold voltage distribution to be at lower threshold voltages within the first threshold voltage distribution without lowering the threshold voltages to be lower than the first threshold voltage distribution; and
the raising comprises raising threshold voltages of memory cells that are identified to be in the lower tail of the second threshold voltage distribution to be at higher threshold voltages within the second threshold voltage distribution without lowering the threshold voltages to be lower than the second threshold voltage distribution.
16. The method of claim 15, wherein:
the lowering threshold voltages uses gate induced drain leakage (GIDL) to lower threshold voltages.
17. The method of claim 13, further comprising:
persistently maintaining the memory cells that are in the lower tail of the second threshold voltage distribution after the raising; and
persistently maintaining the memory cells that are in the upper tail of a first threshold voltage distribution after the lowering.
18. The method of claim 12, wherein:
the reading, identifying and adjusting are performed on a memory die; and
the performing the error correction process on the page of data read and identifying error bits are performed on a memory controller die separate from the memory die.
19. The method of claim 12, wherein:
the set of non-volatile memory cells each store three bits of data per memory cell; and
the process of reading, identifying and adjusting are performed separately for each page of data.
20. A non-volatile storage apparatus, comprising:
a memory die, the memory die comprises a set of non-volatile memory cells and a control circuit connected to the non-volatile memory cells; and
a memory controller off the memory die and connected to the memory die;
the control circuit is configured to read a page of data from the set of non-volatile memory cells including performing one or more sensing operations to sense the page of data and performing an extra sensing operation not required to sense the page of data;
the control circuit is configured to transfer the page of data read to the memory controller;
the memory controller is configured to perform an error correction process on the transferred page of data read, identify error bits in the page of data read, and transfer an identification of the error bits in the page of data read to the memory die;
the control circuit is configured to:
receive from memory controller the identification of error bits in the page of data read, and
based on the received indication of error bits in the page of data read and the extra sensing operation not required to sense the page of data, identify memory cells storing the page of data that are in an upper tail of a first threshold voltage distribution and identify memory cells storing the page of data that are in a lower tail of a second threshold voltage distribution,
lower threshold voltages of identified memory cells storing the page of data that are in the upper tail of the first threshold voltage distribution, and
raise threshold voltages of identified memory cells storing the page of data that are in the lower tail of the second threshold voltage distribution.
US18/624,898 2024-04-02 2024-04-02 Non-volatile memory with in-place error correction Pending US20250308617A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/624,898 US20250308617A1 (en) 2024-04-02 2024-04-02 Non-volatile memory with in-place error correction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US18/624,898 US20250308617A1 (en) 2024-04-02 2024-04-02 Non-volatile memory with in-place error correction

Publications (1)

Publication Number Publication Date
US20250308617A1 true US20250308617A1 (en) 2025-10-02

Family

ID=97176531

Family Applications (1)

Application Number Title Priority Date Filing Date
US18/624,898 Pending US20250308617A1 (en) 2024-04-02 2024-04-02 Non-volatile memory with in-place error correction

Country Status (1)

Country Link
US (1) US20250308617A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10998041B1 (en) * 2020-05-07 2021-05-04 Western Digital Technologies, Inc. Calibrating non-volatile memory read thresholds
US11862250B2 (en) * 2021-03-11 2024-01-02 Yangtze Memory Technologies Co., Ltd. Open block-based read offset compensation in read operation of memory device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10998041B1 (en) * 2020-05-07 2021-05-04 Western Digital Technologies, Inc. Calibrating non-volatile memory read thresholds
US11862250B2 (en) * 2021-03-11 2024-01-02 Yangtze Memory Technologies Co., Ltd. Open block-based read offset compensation in read operation of memory device

Similar Documents

Publication Publication Date Title
US11790994B2 (en) Non-volatile memory with reverse state program
US11894068B2 (en) Efficient sensing of soft bit data for non-volatile memory
US11971829B2 (en) On-the-fly compression scheme for soft bit data in non-volatile memory
US11810628B2 (en) Non-volatile memory with efficient testing during erase
US20230059837A1 (en) Non-volatile memory with efficient testing during erase
US12147695B2 (en) Non-volatile memory with adapting erase process
US20250239315A1 (en) Non-volatile memory with in-place error updating and correction
US20250046386A1 (en) Non-volatile memory with high performance read
US12488846B2 (en) Negative word line enabled pre-boosting strategy to improve NAND program performance
US12469559B2 (en) Non-volatile memory with sub-blocks
US11881271B2 (en) Non-volatile memory with engineered channel gradient
US11972812B2 (en) Non-volatile memory with data refresh based on data states of adjacent memory cells
US11791001B2 (en) Non-volatile memory with updating of read compare voltages based on measured current
US20250308617A1 (en) Non-volatile memory with in-place error correction
US20250321825A1 (en) Non-volatile memory with tail bit identification for in-place error correction
US12406743B2 (en) Non-volatile memory with smart control of overdrive voltage
US12176037B2 (en) Non-volatile memory with different word line to word line pitches
US12555637B2 (en) Non-volatile memory with adaptive dummy word line bias
US12361984B2 (en) Noise reduction in sense amplifiers for non-volatile memory
US12456531B2 (en) Separate peak current checkpoints for closed and open block read ICC countermeasures in NAND memory
US12469568B2 (en) Non-volatile memory with early ramp for improved performance
US20260031165A1 (en) Programming non-volatile memory with narrow threshold voltage distributions
US20250085882A1 (en) Block data encryption of non-volatile memory through selective select gate erase through charge coupled scheme
US20250384936A1 (en) Non-volatile memory with early termination for threshold voltage tracking
US12482532B2 (en) Non-volatile memory with adjustable ramp rate

Legal Events

Date Code Title Description
AS Assignment

Owner name: SANDISK TECHNOLOGIES LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YUAN, JIAHUI;WANG, MING;LI, LIANG;REEL/FRAME:066992/0517

Effective date: 20240401

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: SANDISK TECHNOLOGIES, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SANDISK TECHNOLOGIES LLC;REEL/FRAME:069796/0423

Effective date: 20241227

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, ILLINOIS

Free format text: SECURITY AGREEMENT;ASSIGNOR:SANDISK TECHNOLOGIES, INC.;REEL/FRAME:071050/0001

Effective date: 20250424

Owner name: SANDISK TECHNOLOGIES, INC., CALIFORNIA

Free format text: PARTIAL RELEASE OF SECURITY INTERESTS;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS AGENT;REEL/FRAME:071382/0001

Effective date: 20250424

STPP Information on status: patent application and granting procedure in general

Free format text: ALLOWED -- NOTICE OF ALLOWANCE NOT YET MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STPP Information on status: patent application and granting procedure in general

Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE